SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
You have been consulted to develop a security model to ensure information flow integrity in
a newly formed financial institute. The company has categorised its staff and objects into the
following categories. Top Secret (TS), Secret (SC), Confidential (C), and Unclassified (UC) as
the security/integrity clearance levels with decreasing privileges. Financial (FIN), Executive
(EXE), Marketing (MAR) and Operational (OPR) as object categories.
The following Table explains integrity clearances for subjects and integrity classification for
objects in a company.
If the company has decided to follow BLP (Bella Paduala Model) security model, draw the
access permission matrix that includes all subjects and objects listed above with Read (R)
and/or Write (W) permissions.
begin{tabular}{ccc} hline Subject & Security Level & Category hline Top Executives & TS & FIN,
EXE, OPR, MAR Finance staff & SC & FIN, OPR HR & C & OPR Sales staff & UC & MAR, OPR
Operations staff & UC & OPR hline end{tabular}begin{tabular}{ccc} hline Object & Security Level &
Category hline security_policy & TS & EXE,OPR payroll_db & SC & FIN,OPR employee_contract
& C & OPR bank_details & C & FIN building_access_cards & C & OPR employee_funds & C &
OPR, FIN product_details & UC & MAR sales_logs & UC & OPR,MAR hline end{tabular}

Contenu connexe

Similaire à BLP Model Access Matrix for Financial Institute

Want to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptxWant to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptxRPL For Australia
 
Loading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with ApexLoading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with ApexSalesforce Developers
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxherthalearmont
 
SalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final PresentationSalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final PresentationElliot Mar
 
Dreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula NinjasDreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula NinjasDeepa Patel
 
Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014Deepa Patel
 
Data hero dream ole19
Data hero dream ole19Data hero dream ole19
Data hero dream ole19rikkehovgaard
 
CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010MicheleTaylor
 
SAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelleySAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelleyIntelligroup, Inc.
 
59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-new59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-newhomeworkping4
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementPeter Stinson
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWshyamuopuop
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWshyamuop
 
Creating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case StudyCreating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case Studyuxpin
 
Mastering Lightning Community Development
Mastering Lightning Community DevelopmentMastering Lightning Community Development
Mastering Lightning Community DevelopmentMike Katulka
 
Orchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions frameworkOrchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions frameworkSudipta Deb ☁
 

Similaire à BLP Model Access Matrix for Financial Institute (20)

Want to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptxWant to be a Chief Information Officer 135111 in Australia Learn How..pptx
Want to be a Chief Information Officer 135111 in Australia Learn How..pptx
 
Loading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with ApexLoading Data into the Analytics Cloud with Apex
Loading Data into the Analytics Cloud with Apex
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
 
SalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final PresentationSalesForce Analytics Cloud Final Presentation
SalesForce Analytics Cloud Final Presentation
 
Dreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula NinjasDreamfoce 2013 Formula Ninjas
Dreamfoce 2013 Formula Ninjas
 
Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014Formula Ninja at Dreamforce 2014
Formula Ninja at Dreamforce 2014
 
Data hero dream ole19
Data hero dream ole19Data hero dream ole19
Data hero dream ole19
 
CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010CIO Association of Canada - Calgary Jun 22 2010
CIO Association of Canada - Calgary Jun 22 2010
 
SAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelleySAP Account determination SD-FI by odaiah pelley
SAP Account determination SD-FI by odaiah pelley
 
Building Smart Apps
Building Smart AppsBuilding Smart Apps
Building Smart Apps
 
59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-new59585480 case-study-drivers-ltd-new
59585480 case-study-drivers-ltd-new
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge Management
 
Finding Security Issues Fast!
Finding Security Issues Fast!Finding Security Issues Fast!
Finding Security Issues Fast!
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
 
Bulkify Your Org
Bulkify Your OrgBulkify Your Org
Bulkify Your Org
 
Resume subbu
Resume subbuResume subbu
Resume subbu
 
Creating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case StudyCreating an Enterprise CSS Framework: A Salesforce UX Case Study
Creating an Enterprise CSS Framework: A Salesforce UX Case Study
 
Mastering Lightning Community Development
Mastering Lightning Community DevelopmentMastering Lightning Community Development
Mastering Lightning Community Development
 
Orchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions frameworkOrchestrate all of your salesforce automation with the trigger actions framework
Orchestrate all of your salesforce automation with the trigger actions framework
 

Plus de shanth8

You have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdfYou have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdfshanth8
 
You have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdfYou have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdfshanth8
 
You have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdfYou have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdfshanth8
 
You have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdfYou have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdfshanth8
 
You have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdfYou have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdfshanth8
 
You find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdfYou find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdfshanth8
 
You do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdfYou do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdfshanth8
 
You attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdfYou attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdfshanth8
 
You can define a word array as following data array word.pdf
You can define a word array as following data array word.pdfYou can define a word array as following data array word.pdf
You can define a word array as following data array word.pdfshanth8
 
You are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdfYou are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdfshanth8
 
You are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdfYou are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdfshanth8
 
You are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdfYou are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdfshanth8
 
You are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdfYou are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdfshanth8
 
You are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdfYou are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdfshanth8
 
You are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdfYou are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdfshanth8
 
You are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdfYou are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdfshanth8
 
You are given the following information S12345678.pdf
You are given the following information S12345678.pdfYou are given the following information S12345678.pdf
You are given the following information S12345678.pdfshanth8
 
You are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdfYou are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdfshanth8
 
You are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdfYou are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdfshanth8
 
You are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdfYou are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdfshanth8
 

Plus de shanth8 (20)

You have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdfYou have been assigned to a project team to develop a new pr.pdf
You have been assigned to a project team to develop a new pr.pdf
 
You have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdfYou have been appointed as the information security officer .pdf
You have been appointed as the information security officer .pdf
 
You have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdfYou have a single linked list Write the pseudo stepbyste.pdf
You have a single linked list Write the pseudo stepbyste.pdf
 
You have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdfYou have a large set of data with n elements where n will t.pdf
You have a large set of data with n elements where n will t.pdf
 
You have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdfYou have a data set with 48 observations If it is approxima.pdf
You have a data set with 48 observations If it is approxima.pdf
 
You find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdfYou find a pool of water deep in a cave with some unusual ge.pdf
You find a pool of water deep in a cave with some unusual ge.pdf
 
You do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdfYou do not have to write in sentencesparagraphs just gather.pdf
You do not have to write in sentencesparagraphs just gather.pdf
 
You attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdfYou attend a meeting after receiving an email the day before.pdf
You attend a meeting after receiving an email the day before.pdf
 
You can define a word array as following data array word.pdf
You can define a word array as following data array word.pdfYou can define a word array as following data array word.pdf
You can define a word array as following data array word.pdf
 
You are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdfYou are to consider the design of a web app to help a night .pdf
You are to consider the design of a web app to help a night .pdf
 
You are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdfYou are in the ER and the ER nurse rushes in to get you to i.pdf
You are in the ER and the ER nurse rushes in to get you to i.pdf
 
You are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdfYou are given the null and alternative hypotheses shown belo.pdf
You are given the null and alternative hypotheses shown belo.pdf
 
You are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdfYou are given data for a population The AA individuals aver.pdf
You are given data for a population The AA individuals aver.pdf
 
You are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdfYou are given the following data concerning Freedonia a leg.pdf
You are given the following data concerning Freedonia a leg.pdf
 
You are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdfYou are required to elaborate biodata of the TWO 2 Quality.pdf
You are required to elaborate biodata of the TWO 2 Quality.pdf
 
You are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdfYou are the public relations coordinator for a major cruise .pdf
You are the public relations coordinator for a major cruise .pdf
 
You are given the following information S12345678.pdf
You are given the following information S12345678.pdfYou are given the following information S12345678.pdf
You are given the following information S12345678.pdf
 
You are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdfYou are given a list L and another list P containing in.pdf
You are given a list L and another list P containing in.pdf
 
You are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdfYou are given a 5 x 6 board and a robot initially placed at .pdf
You are given a 5 x 6 board and a robot initially placed at .pdf
 
You are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdfYou are part of the United Nations UN security audit team .pdf
You are part of the United Nations UN security audit team .pdf
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

BLP Model Access Matrix for Financial Institute

  • 1. You have been consulted to develop a security model to ensure information flow integrity in a newly formed financial institute. The company has categorised its staff and objects into the following categories. Top Secret (TS), Secret (SC), Confidential (C), and Unclassified (UC) as the security/integrity clearance levels with decreasing privileges. Financial (FIN), Executive (EXE), Marketing (MAR) and Operational (OPR) as object categories. The following Table explains integrity clearances for subjects and integrity classification for objects in a company. If the company has decided to follow BLP (Bella Paduala Model) security model, draw the access permission matrix that includes all subjects and objects listed above with Read (R) and/or Write (W) permissions. begin{tabular}{ccc} hline Subject & Security Level & Category hline Top Executives & TS & FIN, EXE, OPR, MAR Finance staff & SC & FIN, OPR HR & C & OPR Sales staff & UC & MAR, OPR Operations staff & UC & OPR hline end{tabular}begin{tabular}{ccc} hline Object & Security Level & Category hline security_policy & TS & EXE,OPR payroll_db & SC & FIN,OPR employee_contract & C & OPR bank_details & C & FIN building_access_cards & C & OPR employee_funds & C & OPR, FIN product_details & UC & MAR sales_logs & UC & OPR,MAR hline end{tabular}