Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What protects and describes the Chinese Wall model?



What protects and describes the Chinese Wall model?..

Answer / nimesh maru

Chines wall model / Brewer and Nash Model was created to
provide access controls that can change dynamically
depending upon user's previous action. The primary goal of
this model is to protect against conflict of Interest by
users access attempts.It is based on Information flow model,
so information can flow between subject and objects in a way
that would result in conflict of interest.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Networking Security Interview Questions

explain what is meant by port blocking within lan?

0 Answers  


How do we use rsa for both authentication and secrecy?

0 Answers  


What is shadow it?

0 Answers  


What is stateful inspection firewall?

0 Answers  


What is a ddos attack?

0 Answers  


What are the main components of the CERT Taxonomy?

0 Answers  


What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.

4 Answers   Excel,


Which are the different factors that affect the security of a network?

0 Answers  


What are Digrams and Trigrams

0 Answers   Elgi Equipments,


What is a security policy?

1 Answers   Airtel, Techworld,


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

0 Answers  


What is terminal emulation, in which layer it comes

0 Answers   Elgi Equipments,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)