PIS
PIS
2. Confidentiality Policies
Goals of Confidentiality Policies
Use Cases
3. Integrity Policies
Goals of Integrity Policies
The Biba Model is the opposite of Bell-LaPadula. Instead of confidentiality, it enforces data
integrity.
Use Cases
● Used in financial systems, operating systems, and medical records to ensure data
remains unaltered.
● Combines Biba's Integrity Model with Bell-LaPadula for both confidentiality and
integrity.
● Defines roles for users, data classifications, and access control policies.
Lipner’s Integrity Matrix Model (IMM) in the context of computer security, particularly focusing
on integrity principles. It combines the Bell-LaPadula (BLP) model (which enforces
confidentiality) and the Biba model (which enforces integrity) to create a hybrid policy for
securing commercial systems.
Main Challenges:
● The model enforces strict integrity but requires modifications (e.g., handling transitions
between development and production).
● It may not be the most intuitive approach and could benefit from a completely new
modeling paradigm.
Use Cases
● Availability means that authorized users can access and modify information when
they need it.
● It ensures that important data and systems are always accessible to the right people.
● If availability is compromised, users cannot access critical resources, affecting
productivity and operations.
● Volume-Based Attacks: Overload a system with excessive traffic (e.g., UDP flood,
ICMP flood).
● Protocol Attacks: Exploit weaknesses in system protocols (e.g., SYN floods, Ping of
Death).
● Application Layer Attacks: Target specific applications to slow them down (e.g., HTTP
floods).
● Advanced Persistent DoS (APDoS): Sophisticated and prolonged attacks using
multiple methods.
Final Thoughts