Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of the following security models states that for integrity of data, it must not flow from a receptacle of given integrity to a receptacle of higher integrity?
Bell-LaPadula
Brewer Nash
Clark-Wilson
Biba
Hint/Tip: Biba=Bible=INTEGRITY. The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1975,[1] is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
In general the model was developed to address integrity as the core principle, which is the direct inverse of the Bell–LaPadula model.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.