Wendy Lewis Only
Security ModelsA properly aligned security model ensures an organization’s valuable assets are protected. There are many different security models, and each serves a specific purpose. Often, an organization will incorporate more than one model, or possibly even create its own.Review the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model for security specification from Chapter 3, “Models for Technical Specification of Information Systems Security” of your course textbook, Principles of Information Systems Security.Create a table in Microsoft Word differentiating the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model based on the following topics:Name of the modelAxioms of the modelLevel of access of the modelHierarchy of company modelWhether the model deals with integrity or security (or both)The overall table should provide enough information so that the purpose of each model can be explained.