Non-Interference Model
The Non-Interference Model, created by Joseph Goguen and Jose Meseguer in 1982, aims to prevent information leakage between security levels. It's based on the concept of 'non-interference', meaning that actions at one security level should not impact anothe security level. Users at a lower security level should not be aware of actions taken by users at a higher security level. This model helps to maintain confidentiality and prevent information leakage, but it has limited real-world applicability due to its strict non-interference policy. It's often used in combination with other models to create a more comprehensive security architecture.
Non-Interference Model Guide
What is Non-Interference Model:
The Non-Interference Model is a security architecture model used in the field of Computer Security to ensure that the actions of one user or process do not interfere with the actions of another. The principle states that an action in a high-security level should not have influences on a lower security level ensuring a system's security.
Importance of Non-Interference Model:
The Non-Interference Model is important as it offers a level of security assurance by preventing information leakage between different security domains, especially from high to low
How Non-Interference Model Works:
It works by ensuring that a subject at a certain security level doesn't affect or interfere with any objects at other security levels. Actions in the high-security levels are not visible to the lower levels and thus, users in lower levels cannot infer any information about the higher levels.
Exam Tips: Answering Questions on Non-Interference Model:
1. Understand the concept: Have a clear understanding of the Non-Interference Model and its functions. It is about isolation and preventing cross-domain impact.
2. Principle: Remember that 'High-level actions' should not interfere with 'low-level actions'. This encapsulates the idea of the model.
3. Examples: Be prepared to give examples of how the non-interference model operates, or could operate, in real-world scenarios.
CISSP - Security Architecture Models Example Questions
Test your knowledge of Amazon Simple Storage Service (S3)
Question 1
You are reviewing a company's access control policies. They primarily follow a non-interference model, but have recently introduced additional access control restrictions for confidential projects. Which measure should be taken to maintain the adherence to the Non-Interference Model?
Question 2
You are a security officer in a multinational corporation. The company wants to deploy an access control model that ensures no information flows from high-sensitive personnel to low-sensitive personnel. Which model would be the best choice?
Question 3
An organization wants to enforce separation of duties while following a Non-Interference Model. When implementing this model, which property or concept should be considered?
Go Premium
CISSP Preparation Package (2024)
- 4537 Superior-grade CISSP practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless CISSP preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!