CIS 502 Assignment 3
in Computers by neel
Favorite
Add it to your favorites and revisit later
Instant Download
Previewing 1 of 5 total pages.
Regular Price: $21.43
Your Price: $15.00 (30% discount)
You Save: $6.43
Your Price: $15.00 (30% discount)
You Save: $6.43
Description
Running head: Security Architecture Models
Security Architecture Models in Information Technology Management
Donald Shipman
Strayer University
Prof. Adebiaye
May 19, 2012
Architecture Models
Security architecture models are great tools to assist an organization by elucidating information security operations as well as making enhancements through revision. Formal models demonstrate how specific security methods can be integrated with an information system. Some models are built into computer hardware or software, other are in line with policies and procedures, and some are part of both.
Biba Integrity Model
The Biba Integrity model is based on the premise that higher levels of integrity are more worthy of trust than lower ones. (Whitman, 2012) The desired concept to be...
Comments (0)
You must sign in to make a comment.
Rating:
Published On:
06/10/2015
Print Length:
5 page(s)
Word Count:
715
File Name:
cis-502-assignment-3-69.docx
File Size:
34.04 KB (0.03 MB)
Sold By:
neel
Purchased:
0 times
Best Seller Ranking:
#24396