What security model has 8 rules?

What security model has 8 rules?

What security model has 8 rules?

A.
Graham-Denning

B.
Harrison-Ruzzo-Ullman

C.
TCSEC

D.
Zachman Framework

Explanation:
Answer A is correct; Graham-Denning has eight rules: Transfer Access, Grant Access, Delete Access, Read Object, Create Object, Destroy Object, Create Subject, and Destroy Subject.

Incorrect Answers and Explanations: B, C, and D: Answers B, C, and D are incorrect. Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations. TCSEC has four classes, from A to D: The Zachman Framework has six frameworks (what, how, where, who, when, and why), mapped across rules including planner, owner, designer, builder, programmer, and user.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


joe

joe

Graham-Denning has eight rules:

1. Transfer Access,
2. Grant Access,
3. Delete Access,
4. Read Object,
5. Create Object,
6. Destroy Object,
7. Create Subject,
8. Destroy Subject.

Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations

TCSEC has four classes, from A to D

joe

joe

Class A – Verified protection

Class B – MAC Mandatory protection apply

Class C – DAC discretionary protection

Class D – Security