Bell-LaPadula Model

The First Mathematical Model of a Multi-Level Security Policy

Prev Question Next Question

Question

What is the name of the first mathematical model of a multi-level security policy used to define the concept of a secure state, the modes of access, and rules for granting access?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

The correct answer is D. Bell-LaPadula Model.

The Bell-LaPadula model is the first mathematical model of a multi-level security policy. It was developed in the early 1970s by David Elliott Bell and Leonard J. LaPadula. The model was designed to provide a framework for understanding and implementing a secure state, modes of access, and rules for granting access in a computer system.

The Bell-LaPadula model is based on the concept of a secure state, which is a state in which information is protected from unauthorized access or modification. The model defines two security properties: confidentiality and integrity. Confidentiality refers to the protection of information from unauthorized disclosure, while integrity refers to the protection of information from unauthorized modification.

The Bell-LaPadula model also defines two modes of access: read and write. The read mode allows a user to view information, while the write mode allows a user to modify information. The model defines rules for granting access to information based on a user's clearance level and the sensitivity level of the information.

The Bell-LaPadula model is a mandatory access control (MAC) model, which means that access to information is controlled by the system, not by the user. The model is based on the principle of least privilege, which means that a user is only granted the access necessary to perform their job function.

In summary, the Bell-LaPadula model is a mathematical model of a multi-level security policy that defines the concept of a secure state, modes of access, and rules for granting access based on a user's clearance level and the sensitivity level of the information.