Page 540 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 540

Written Lab


                1.  Name at least seven security models.

                2.  Describe the primary components of TCB.

                3.  What are the two primary rules or principles of the Bell-LaPadula
                    security model? Also, what are the two rules of Biba?


                4.  What is the difference between open and closed systems and open
                    and closed source?
   535   536   537   538   539   540   541   542   543   544   545