Which of the following statements best describes the Biba security model?

A. No read up and write up
B. No write up and no write down
C. No read up and no write down
D. No read down and no write up

Answer: D
Explanation: The Biba model objective is to ensure data integrity. The model works on the principle of restricting users to read data at lower than their level and to write data at higher than their security level. This model was designed in the 1970s for the U.S. military.

Computer Science & Information Technology

You might also like to view...

CPU stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

COGNITIVE ASSESSMENT You are using an optical disc on your game console. Which of the following is it most likely to be?

A. CD-RW B. mini disc C. play disc D. DVD-ROM

Computer Science & Information Technology