Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What protects and describes the Chinese Wall model?



What protects and describes the Chinese Wall model?..

Answer / nimesh maru

Chines wall model / Brewer and Nash Model was created to
provide access controls that can change dynamically
depending upon user's previous action. The primary goal of
this model is to protect against conflict of Interest by
users access attempts.It is based on Information flow model,
so information can flow between subject and objects in a way
that would result in conflict of interest.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Networking Security Interview Questions

Why is it important to have a nac solution?

0 Answers  


What are major types of networks and explain

0 Answers   Elgi Equipments,


What are worms?

0 Answers  


Is folder redirection functionality supported in Windows server 2008???

1 Answers   Wipro,


What is proxy firewall?

0 Answers  


What is RIS?

0 Answers  


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

0 Answers  


What is difference between arp & rarp? How both of these protocols will work, and where it will use?

0 Answers  


What are digital signatures and smart cards?

0 Answers  


How long can a ddos attack last?

0 Answers  


Which are the different factors that affect the security of a network?

0 Answers  


What is ransomware?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)