After a breach in your organization resulted in the public release of top secret information, the company implemented a MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix. What is the property that has been implemented with the no read-up MAC?

A. simple security property
B. star property
C. discretionary security property
D. strong star property

A
Explanation: The Bell–LaPadula model defines two mandatory access control (MAC) rules and one discretionary access control (DAC) rule with three security properties. The following properties have been implemented in this scenario:
• No read-up MAC = simple security property
• No write down MAC = star property
• DAC using an access control matrix = discretionary security property

Computer Science & Information Technology

You might also like to view...

The desktop version of ________ has an option to turn its popup blocker off and on

Fill in the blank(s) with correct word

Computer Science & Information Technology

Information about the ____ of the target audience tells you what colors, symbols, fashions, styles, and so forth will be effective in communicating with the target audience.

A. Internet connection B. interests C. culture and customs D. spending habits

Computer Science & Information Technology