Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 2 Question 84 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 84
Topic #: 2
[All CSSLP Questions]

You work as an analyst for Tech Perfect Inc. You want to prevent information flow that may cause a conflict of interest in your organization representing competing clients. Which of the following security models will you use?

Show Suggested Answer Hide Answer
Suggested Answer: B

The Chinese Wall Model is the basic security model developed by Brewer and Nash. This model prevents information flow that may cause a

conflict of interest in an organization representing competing clients. The Chinese Wall Model provides both privacy and integrity for data.

Answer D is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer C is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer A is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military

applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use

security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least

sensitive (e.g., 'Unclassified' or 'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.


Contribute your Thoughts:

Johnathon
7 months ago
I would go with the Bell-LaPadula model, it's specifically designed for confidentiality.
upvoted 0 times
...
Noemi
7 months ago
I think the Clark-Wilson model could also be effective in this situation.
upvoted 0 times
...
Lenna
7 months ago
I agree with the Chinese Wall model prevents conflicts of interest.
upvoted 0 times
...
Mohammad
7 months ago
I think I would use the Chinese Wall model.
upvoted 0 times
...
Mabelle
8 months ago
I agree, the Chinese Wall model is designed for handling conflicts of interest.
upvoted 0 times
...
Temeka
8 months ago
I think we should use the Chinese Wall model for that.
upvoted 0 times
...
Filiberto
8 months ago
We need to prevent information flow that may cause a conflict of interest in our organization.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77