Security Models

• Resources Overview

During Week 1, you will use a variety of resources, both required and optional, including selections from the course textbook. You will be reading chapter selections from the course textbook, Principles of Information Security: Texts and Cases by Dhillon. The Weekly Schedule (a navigation link under Week 1) outlines the resources you will need to complete the Discussion, Application Assignments, and the Group Project.
This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week’s assigned Learning Resources. To access select media resources, please use the media player below.
________________________________________
Media
Video: Week 1 Overview
Note: The approximate length of this media piece is 19 minutes.
This video provides an introduction to the week’s resources and assignments.
Accessible player
________________________________________
Reading
Course Text: Principles of Information Systems Security
• Chapter 1, “Information Systems Security: Nature and Scope”
Chapter 1 discusses the definition of IS security and identifies three security controls that are implemented by organizations to enhance their information security.
________________________________________
Reading
Course Text: Principles of Information Systems Security
• Chapter 2, “Security of Technical Systems in Organizations: An Introduction”
Chapter 2 discusses vulnerabilities that exist in IS and provides three different methods of defense against them–encryption, software controls, and physical and hardware controls.
________________________________________
Reading
Course Text: Principles of Information Systems Security
• Chapter 3, “Models for Technical Specification of Information Systems Security”
Chapter 3 discusses different data and integrity models used in IS security, including the Bell La Padula model, the Denning Information Flow model, the Biba model, and the Clark-Wilson model.
________________________________________
Web Resource

READ ALSO :   Reflection Paper – Inside Amazon

Computer Security Act of 1987
Visit this Web site to read the report from the Computer Security Act of 1987. This Act was passed to improve the security and privacy of sensitive information in the computer systems of the federal US governmental agencies. It establishes minimum acceptable security practices for these systems. This Act has been superseded by the Federal Information Security Management Act (FISMA) of 2002.

• Application
Security Models
To prepare for this Application Assignment, review the Bell La Padula Model, the Denning Information Flow Model, Rushby’s Model, the Biba Model, and the Clark-Wilson Model for security specification from Chapter 3, “Models for Technical Specification of Information Systems Security” of your course textbook, Principles of Information Security.
Then, create a table in Microsoft Word differentiating each of the models based on the following topics:
1. Name of the model
2. Axioms of the model
3. Level of access model
4. Hierarchy of company model
5. Whether the model deals with integrity or security (or both)

The overall table should provide enough information so that the purpose of each model can be explained.
TAKE ADVANTAGE OF OUR PROMOTIONAL DISCOUNT DISPLAYED ON THE WEBSITE AND GET A DISCOUNT FOR YOUR PAPER NOW!