Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What protects and describes the Chinese Wall model?



What protects and describes the Chinese Wall model?..

Answer / nimesh maru

Chines wall model / Brewer and Nash Model was created to
provide access controls that can change dynamically
depending upon user's previous action. The primary goal of
this model is to protect against conflict of Interest by
users access attempts.It is based on Information flow model,
so information can flow between subject and objects in a way
that would result in conflict of interest.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Networking Security Interview Questions

what is firewall and types of it?

6 Answers   Cyberoam, Wipro,


IS IC AND MICROPROCESSOR ARE SAME?

1 Answers  


What is phishing?

4 Answers   Global Logic,


What is the sense of a fingerprint?

0 Answers  


how remove add on from explorer

0 Answers   Genpact,


What is multicasting?

0 Answers  


What protects the Clark Wilson model?

1 Answers   Airtel,


A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?

3 Answers   Wipro,


What are the properties of universal trojan horses?

1 Answers  


What is remote access vpn?

0 Answers  


Explain what are all the technical steps involved when the data transmission from server via router?

0 Answers  


How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?

4 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)