Chapter 5. Security Architecture and Models
Terms you’ll need to understand
✓ Trusted Computer System Evaluation Criteria (TCSEC)
✓ Information Technology System Evaluation Criteria (ITSEC)
✓ System vulnerabilities
Techniques you’ll need to master
✓ Understanding confidentiality models such as Bell-LaPadula
✓ Identifying integrity models such as Biba and Clark-Wilson
✓ Understanding common flaws and security issues associated with system architecture designs
✓ Distinguishing between certification and accreditation
Introduction
The security architecture and models domain deals with hardware, software, ...
Get CISSP Exam Cram, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.