Which of the following statements best describes the Biba security model?

A. No read up and write up
B. No write up and no write down
C. No read up and no write down
D. No read down and no write up


Answer: D
Explanation: The Biba model objective is to ensure data integrity. The model works on the principle of restricting users to read data at lower than their level and to write data at higher than their security level. This model was designed in the 1970s for the U.S. military.

Computer Science & Information Technology

You might also like to view...

If someone wanted to broadcast a copy of a video presentation, is a circuit switching system or a packet switching preferable? Why?

What will be an ideal response?

Computer Science & Information Technology

Clicking ________ is how users "like" a post on Google+

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Word Options dialog box, All Commands can be found from the ________ box

A) Choose commands from B) Add C) New Group D) Customize the ribbon

Computer Science & Information Technology

The related data values used in creating a chart are called ________

A) a legend B) category labels C) data series D) value labels

Computer Science & Information Technology