SlideShare a Scribd company logo
1 of 1
Download to read offline
You have been consulted to develop a security model to ensure information flow integrity in
a newly formed financial institute. The company has categorised its staff and objects into the
following categories. Top Secret (TS), Secret (SC), Confidential (C), and Unclassified (UC) as
the security/integrity clearance levels with decreasing privileges. Financial (FIN), Executive
(EXE), Marketing (MAR) and Operational (OPR) as object categories.
The following Table explains integrity clearances for subjects and integrity classification for
objects in a company.
If the company has decided to follow BLP (Bella Paduala Model) security model, draw the
access permission matrix that includes all subjects and objects listed above with Read (R)
and/or Write (W) permissions.
begin{tabular}{ccc} hline Subject & Security Level & Category hline Top Executives & TS & FIN,
EXE, OPR, MAR Finance staff & SC & FIN, OPR HR & C & OPR Sales staff & UC & MAR, OPR
Operations staff & UC & OPR hline end{tabular}begin{tabular}{ccc} hline Object & Security Level &
Category hline security_policy & TS & EXE,OPR payroll_db & SC & FIN,OPR employee_contract
& C & OPR bank_details & C & FIN building_access_cards & C & OPR employee_funds & C &
OPR, FIN product_details & UC & MAR sales_logs & UC & OPR,MAR hline end{tabular}

More Related Content

Similar to You have been consulted to develop a security model to ensur.pdf

Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
herthalearmont
 
SalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final PresentationSalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final Presentation
Elliot Mar
 
CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010
MicheleTaylor
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge Management
Peter Stinson
 

Similar to You have been consulted to develop a security model to ensur.pdf (20)

Want to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptxWant to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptx
 
Loading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with ApexLoading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with Apex
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
 
SalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final PresentationSalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final Presentation
 
Dreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula NinjasDreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula Ninjas
 
Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014
 
Data hero dream ole19
Data hero dream ole19Data hero dream ole19
Data hero dream ole19
 
CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010
 
SAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelleySAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelley
 
Building Smart Apps
Building Smart AppsBuilding Smart Apps
Building Smart Apps
 
59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-new59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-new
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge Management
 
Finding Security Issues Fast!
Finding Security Issues Fast!Finding Security Issues Fast!
Finding Security Issues Fast!
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
 
Bulkify Your Org
Bulkify Your OrgBulkify Your Org
Bulkify Your Org
 
Resume subbu
Resume subbuResume subbu
Resume subbu
 
Creating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case StudyCreating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case Study
 
Mastering Lightning Community Development
Mastering Lightning Community DevelopmentMastering Lightning Community Development
Mastering Lightning Community Development
 
Orchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions frameworkOrchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions framework
 

More from shanth8

You are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdfYou are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdf
shanth8
 

More from shanth8 (20)

You have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdfYou have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdf
 
You have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdfYou have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdf
 
You have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdfYou have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdf
 
You have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdfYou have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdf
 
You have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdfYou have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdf
 
You find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdfYou find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdf
 
You do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdfYou do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdf
 
You attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdfYou attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdf
 
You can define a word array as following data array word.pdf
You can define a word array as following data array word.pdfYou can define a word array as following data array word.pdf
You can define a word array as following data array word.pdf
 
You are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdfYou are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdf
 
You are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdfYou are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdf
 
You are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdfYou are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdf
 
You are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdfYou are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdf
 
You are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdfYou are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdf
 
You are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdfYou are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdf
 
You are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdfYou are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdf
 
You are given the following information S12345678.pdf
You are given the following information S12345678.pdfYou are given the following information S12345678.pdf
You are given the following information S12345678.pdf
 
You are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdfYou are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdf
 
You are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdfYou are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdf
 
You are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdfYou are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdf
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

You have been consulted to develop a security model to ensur.pdf

  • 1. You have been consulted to develop a security model to ensure information flow integrity in a newly formed financial institute. The company has categorised its staff and objects into the following categories. Top Secret (TS), Secret (SC), Confidential (C), and Unclassified (UC) as the security/integrity clearance levels with decreasing privileges. Financial (FIN), Executive (EXE), Marketing (MAR) and Operational (OPR) as object categories. The following Table explains integrity clearances for subjects and integrity classification for objects in a company. If the company has decided to follow BLP (Bella Paduala Model) security model, draw the access permission matrix that includes all subjects and objects listed above with Read (R) and/or Write (W) permissions. begin{tabular}{ccc} hline Subject & Security Level & Category hline Top Executives & TS & FIN, EXE, OPR, MAR Finance staff & SC & FIN, OPR HR & C & OPR Sales staff & UC & MAR, OPR Operations staff & UC & OPR hline end{tabular}begin{tabular}{ccc} hline Object & Security Level & Category hline security_policy & TS & EXE,OPR payroll_db & SC & FIN,OPR employee_contract & C & OPR bank_details & C & FIN building_access_cards & C & OPR employee_funds & C & OPR, FIN product_details & UC & MAR sales_logs & UC & OPR,MAR hline end{tabular}