Graham-Denning Model
The Graham-Denning Model is a formal system for specifying access control policies in computer systems. It comprises of a set of rules and object descriptors that define user and object operations, as well as who can perform them. The model is primarily designed to address the security concerns in multiprocessing systems and ensure that only authorized users can access and manipulate data. The model contains two main components: the protection system functions and the protection system primitives. The first one describes the operations that users can perform on objects, such as creating, deleting, and modifying objects. The second one defines the basic operations that users can perform, such as getting an object, setting an object, and executing an object. The Graham-Denning Model supports two types of access to objects: discretionary access control, where users can define who can access their objects, and mandatory access control, where access to objects is determined by system-wide policies.
Guide to Graham-Denning Model
What is the Graham-Denning Model:
The Graham-Denning Model is a security model that articulates formal rules for managing computer security issues regarding processes and subjects. It revolves around building a system that governs how processes interact, focusing mainly on protection domains, objects, and the rules that specify rights.
Importance of the Graham-Denning Model:
The Graham-Denning model is important for:
- Ensuring secure information flow within a system
- Maintaining proper access rights
- Preventing unauthorized access to processes or objects
How it works:
The Graham-Denning model operates based on a set of '8' rules:
- Create object
- Delete object
- Create subject
- Delete subject
- Provide 'read' access
- Provide 'write' access
- Provide 'execute' access
- Transfer access rights
Exam Tips: Answering Questions on Graham-Denning Model:
- Understand the eight rules thoroughly - the exam may include questions on them individually or in combinations.
- Focus on the relationship between subjects and objects in the model.
- Be able to explain how rights may be transferred, deleted, or created within the Graham-Denning model.
CISSP - Security Architecture Models Example Questions
Test your knowledge of Amazon Simple Storage Service (S3)
Question 1
A company is implementing the Graham-Denning model for information security. The security officer only wants to allow certain users to transfer ownership of an object. Which of the following rules should be implemented?
Question 2
In the Graham-Denning model, which rule should be implemented to allow an object creator to grant read access to other subjects?
Question 3
In an organization using the Graham-Denning model, a user wants to transfer the ownership of a file to another user. What initial step should be performed?
Go Premium
CISSP Preparation Package (2024)
- 4537 Superior-grade CISSP practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless CISSP preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!