Blog
Computer sciences and Information technology: Domain 3 – Security Engineering/Security Architecture Design
After reading this week’s materials, please respond to one or more of the following questions.
1. Describe the difference between the Biba Integrity Model and the Clark-Wilson Integrity Model. Give an overview of the Bell LaPadula Confidentiality.
2. In your own words, describe the concept of ring protection. What is the difference between Layering and data hiding?
3. Describe the different components addressed within the Common Criteria used for evaluation of the security elements within a system. What is the difference between certification and accreditation of a system?.
4. Define cloud computing and describe the differences between Software as as Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Define parallel computing and describe bit-level parallelism, instruction-level parallelism, task-level parallelism, and data parallelism.
Week 2 Discussion Threads
A minimum of 200 words is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement.
Discussion Question 1:
Compare and Contrast IPv4 and IPv6. Find examples of companies who are currently using IPv6. What are some of the benefits of using IPv6 over IPv4 and vice versa.
