The chinese wall security policy is a well-known


Review this article with reference in APA format.

The British Medical Association or BMA model was created to describe the information flows permitted by medical ethics.

The Chinese Wall security policy is a well-known information control policy used in the commercial world that is used to specify control over information when conflicts of interest arise.

The Chinese model is designed to prevent the subject from sharing information with others not at the same level. It is called the Chinese Wall Model because, like the Great Wall of China, once on one side of the wall, a person cannot get to the other side. The idea behind Chinese Wall Model is that the access control rules are based on the subject behavior (Anderson, 2008).

The Chinese Wall model uses a more centralized approach to managing access control while the BMA model uses a decentralized model. The question was raised is there a way to combine the BMA model with the Chinese Wall model.

It could be possible to use the centralized approach aka the Chinese Wall model for larger or big picture security access while letting the more fine-grained access control of a specific system use the BMA model.

When creating a security policy, we need to keep in mind that should find the best possible solution for what works for the situation we are faced with.

Ideally, we should constantly look for ways to improve the security posture of our systems (Tipton & Hernandez, 2013). "Now the earth was formless and empty.and God said, 'Let there be light,' and there was light. (Genesis 1:2-3, NIV)." Genesis tells us that in the beginning, God created the heavens and earth, but before He spoke the world into existence, it was formless and void. If God can make the world out of nothing, He can take and guide us to give us the knowledge to go from an empty security policy and create something to keep our assets safe.

He can bring light into the darkest hour when our systems might have compromised. References: Anderson, R. (2010). Security engineering: A guide to building dependable distributed systems.

Indianapolis, IN: Wiley Pub.Tipton, H. F., & Hernandez, S. (2013). Official (ISC)2 guide to the CISSP CBK. Boca Raton: (ISC)2, CRC Press, Taylor & Francis Group. MB

Solution Preview :

Prepared by a verified Expert
Software Engineering: The chinese wall security policy is a well-known
Reference No:- TGS02773073

Now Priced at $10 (50% Discount)

Recommended (91%)

Rated (4.3/5)