Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What protects and describes the Chinese Wall model?

Answer Posted / nimesh maru

Chines wall model / Brewer and Nash Model was created to
provide access controls that can change dynamically
depending upon user's previous action. The primary goal of
this model is to protect against conflict of Interest by
users access attempts.It is based on Information flow model,
so information can flow between subject and objects in a way
that would result in conflict of interest.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

1039


Why do we use virtual private network?

1111


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

1037


What does cia stand for in security management?

1145


What are the main components of the CERT Taxonomy?

4008


What is network security?

1068


What is cybersecurity?

1081


What is trojan virus?

1063


Can you give me some ransomware variants?

1035


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

1001


Difference between the communication and transmission.

1040


Explain what are digital signatures and smart cards?

1272


What are the benefits of the firewall?

1103


What is a ddos attack?

978


What is an information security management system (isms)?

1182