Protection Model
Protection Model
Protection Model
2. Confidentiality Model
3. Integrity Model
4. Availability Model
• The Access Control Model is a security model that governs how users are
granted access to system resources and data.
• The goal of the Access Control Model is to ensure that only authorized
individuals or processes are allowed to access specific resources or perform
certain actions within a system.
• This model assigns security labels (e.g., security classifications or levels) to both
users and system resources.
• Access decisions are based on the labels and predefined access rules, which are
typically enforced by the operating system or security software
• In this model, access control decisions are left to the discretion of the resource
owner.
• Each resource has an associated Access Control List (ACL) that specifies the
permissions granted to individual users or groups.
• Users are assigned specific roles, and permissions are assigned to these roles
rather than to individual users.
• Attributes such as user roles, time of access, location, and data classification can
be considered when determining access permissions. RBAC uses a set of
predefined rules to determine access permissions.
• These rules are based on conditions or criteria specified in policies and are
evaluated to determine whether access should be granted or denied.
Information Security
• Each Access Control Model has its own advantages and is suitable for different
security requirements and environments.
2)Confidentiality Model
• It outlines the measures and mechanisms put in place to ensure that sensitive
information is only accessible to authorized individuals or entities and remains
confidential
• The BLP model is based on the concept of multilevel security and is primarily
used in government and military contexts.
• It enforces the “no read up, no write down” principle, meaning that a user or
process at a certain security level can only access or modify information at that
level or lower.
Biba Model
• The Biba model, also based on multilevel security, focuses on the integrity of
information.
Information Security
• It enforces the “no write up, no read down” principle, ensuring that information
is not modified or accessed by entities with lower integrity levels.
Lattice-Based Model
Non-Interference Model
3)Integrity Model
1. Biba Model
2. Clark-Wilson Model
Information Security
3. Non-Interference Model
4. Brewer-Nash Model (also known as the "CAP Theorem")
5. Trusted Computing Base (TCB) Model
Brewer-Nash Model
• The TCB model focuses on defining and protecting a trusted computing base,
which includes the hardware, software, and firmware components that are
essential for system integrity.
• These integrity models, among others, provide guidelines and mechanisms for
maintaining the integrity of data and ensuring that unauthorized modifications or
corruption are prevented.
4)Availability Model
Information Security
• This includes redundant power supplies, network links, servers, and data
centers
Load Balancing
Fault Tolerance
Information Security
• Designing systems with built-in capabilities to detect and recover from failures
automatically.
• This includes data backups, off-site storage, and predefined procedures for
system recovery and business resumption. Protection Models cont…Availability
Model: Distributed Denial-of-Service (DDoS) Mitigation
• This may involve traffic analysis, rate limiting, or deploying DDoS protection
services. Protection Models cont…Availability Model: Incident Response and
Incident Management
• The goal is to create multiple barriers and safeguards to prevent or mitigate the
impact of security breaches and attacks.
• Each layer in the Defense in Depth model provides a unique set of security
controls and measures, collectively forming a robust and comprehensive security
posture
Here are the key components or layers typically found in a Defense in Depth
model:
1. Perimeter Security
2. Network Security
3. Host-based Security
4. Application Security
5. Data Security
6. User Security
7. Physical Security
Perimeter Security
Information Security
• The outermost layer focuses on securing the network perimeter and preventing
unauthorized access.
Network Security
Host-Based Security
Application Security
• It includes practices such as secure coding, input validation, access controls, and
web application firewalls (WAFs) to prevent common application-level attacks like
SQL injections, cross-site scripting (XSS), and code exploits
Data Security
User Security
• This layer involves securing user accounts, authentication mechanisms, and user
behavior.
Physical Security
• This layer addresses physical threats to the infrastructure and facilities where
systems and data reside.