PrepAway - Latest Free Exam Questions & Answers

What security model has 8 rules?

What security model has 8 rules?

PrepAway - Latest Free Exam Questions & Answers

A.
Graham-Denning

B.
Harrison-Ruzzo-Ullman

C.
TCSEC

D.
Zachman Framework

Explanation:
Answer A is correct; Graham-Denning has eight rules: Transfer Access, Grant Access, Delete Access, Read Object, Create Object, Destroy Object, Create Subject, and Destroy Subject.

Incorrect Answers and Explanations: B, C, and D: Answers B, C, and D are incorrect. Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations. TCSEC has four classes, from A to D: The Zachman Framework has six frameworks (what, how, where, who, when, and why), mapped across rules including planner, owner, designer, builder, programmer, and user.

2 Comments on “What security model has 8 rules?

  1. joe says:

    Graham-Denning has eight rules:

    1. Transfer Access,
    2. Grant Access,
    3. Delete Access,
    4. Read Object,
    5. Create Object,
    6. Destroy Object,
    7. Create Subject,
    8. Destroy Subject.

    Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations

    TCSEC has four classes, from A to D




    0



    0

Leave a Reply