O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Information security models

Computer security is based on the role of various entities within the system and their CIA requirement. Information security models address the CIA requirements in computing systems and data.

Take-grant model

This computer security model is also called the take-grant protection model and it specifies obtaining (taking) rights from one entity and giving them to another or the transferring (granting) of rights by one entity to another. There are two entities defined in this model: a subject and object. In simple terms, this model proposes a directed graph that represents the transfer of rights.

There are four rules in this model; they are as follows:

  • Take rule: The subject takes rights of another subject
  • Grant rule: The subject ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required