In the Lattice Based Access Control model, controls are applied to:

In the Lattice Based Access Control model, controls are applied to:

In the Lattice Based Access Control model, controls are applied to:

A.
Scripts

B.
Objects

C.
Models

D.
Factors

Explanation:
Information flow is clearly central to confidentiality but to some extent it also
applies to integrity. The basic work in this area was done around 1970 and was driven
mostly by the defense sector. Information flow in computer systems is concerned with
flow from one security class (also called security label) to another. These controls
are applied to objects. An object is a container of information, and an object can be a
directory or file.



Leave a Reply 0

Your email address will not be published. Required fields are marked *