Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What protects and describes the Chinese Wall model?

Answer Posted / nimesh maru

Chines wall model / Brewer and Nash Model was created to
provide access controls that can change dynamically
depending upon user's previous action. The primary goal of
this model is to protect against conflict of Interest by
users access attempts.It is based on Information flow model,
so information can flow between subject and objects in a way
that would result in conflict of interest.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What factors would you consider before deploying a web intrusion detection system?

952


How do we use rsa for both authentication and secrecy?

957


What is threat-focused ngfw?

918


What are the main components of the CERT Taxonomy?

3953


Where do you get updates on security?

1003


What is trojan virus?

982


What are the types fo ddos attacks?

1092


What are the different types of vpns?

1004


What is the general data protection regulation (gdpr)?

1048


What is shadow it?

954


How does a virtual private network (vpn) work?

1038


What is proxy firewall?

1000


What are Digrams and Trigrams

1119


Define the meaning of an Authentication.

1034


What are the types of Transmission media

1058