Which of the following statements best describes the Biba security model?
A. No read up and write up
B. No write up and no write down
C. No read up and no write down
D. No read down and no write up
Answer: D
Explanation: The Biba model objective is to ensure data integrity. The model works on the principle of restricting users to read data at lower than their level and to write data at higher than their security level. This model was designed in the 1970s for the U.S. military.
Computer Science & Information Technology
You might also like to view...
CPU stands for ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
COGNITIVE ASSESSMENT You are using an optical disc on your game console. Which of the following is it most likely to be?
A. CD-RW B. mini disc C. play disc D. DVD-ROM
Computer Science & Information Technology