CISSP The Clark-Wilson Model – Bk1D3T2St3

Clark and the clark wilson model argue that a lattice model, such as the Biba model, is not sufficient to protect the integrity of data. Their proposed approach is to base the security model on two concepts that the commercial world developed to protect against fraud long before computers:

  • Well-formed transactions
  • Separation of duties

In contrast to the Bell LaPadula and Biba models, which permit a subject to make any changes to an object, if they are permitted to make any (i.e. have write permission), the Clark-Wilson concept of a well-formed transaction is that subjects are constrained to make only those changes which maintain the integrity of the data.

Related Product : Computer Hacking Forensic Investigator | CHFI

The example from the original paper outlining Clark Wilson Model model is the handwritten ledger when bookkeepers wrote in ink, and mistakes were corrected by entering a correcting  or reversing entry. Signs that the entries in the ledger had been erased (which would be obvious given the use of indelible ink) would be detected as a violation of the ledger’s integrity and a possible indication of fraud.

The practice of separation of duties in the commercial world aims to make sure that the accounting record accurately reflects reality.

The Brewer-Nash Model

The Brewer-Nash model was developed to implement an ethical wall security policy. In the commercial world there are regulatory requirements designed to prevent conflicts of interest arising from insider knowledge. These rules require that organizations establish barriers to prevent those with confidential information from being placed in a position where that knowledge could improperly influence their actions.

Follow Us
https://www.facebook.com/INF0SAVVY
https://www.linkedin.com/company/14639279/admin/