Which of the following statements best describes the Biba security model?
A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
D) No read down, no write up
Computer Science & Information Technology
You might also like to view...
________ consists of testing an application with a user prior to releasing an application for wider use
Fill in the blank(s) with correct word
Computer Science & Information Technology
Pointing to a sizing handle of a chart allows you to move it. __________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology