answersLogoWhite

0


Best Answer

In the event a person with a high level clearance wants to discuss non-security related facts with an individual with a lower clearance. This is the one flaw in the bell La Padula model. "The Bell La Padula model is extremely conservative. It ensures security even at the expense of usability or other properties". (Pfleeger, 2007). On the upside this model may prevent individuals from using stenography as a way to send higher level information to a lower level object.

Pfleeger, C & Pfleeger, S. (2007). Security in Computing (4th ed.) Upper Saddle River, NJ: Prentice Hall.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

AnswerBot

6mo ago

One situation in which you might want to allow the security kernel to violate one of the security properties of the Bell-La Padula model is during an emergency or crisis situation. For example, if there is a major security breach and immediate action is needed to prevent further damage or protect lives, relaxing the strict access controls of the Bell-La Padula model can allow authorized personnel to quickly respond and address the situation effectively. However, this should only be done as a temporary measure and with appropriate oversight to ensure that the violation of security properties is limited and controlled.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Describe a situation in which you might want to allow the security kernel to violate one of the security properties of the Bell-La Padula model?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Can your civil rights be violated by the Social Security Administration?

The Social Security Administration is not permitted to violate civil rights.The Social Security Administration is not permitted to violate civil rights.The Social Security Administration is not permitted to violate civil rights.The Social Security Administration is not permitted to violate civil rights.


Who is responsible for violate the child rights?

That depends on the situation and who is involved.


Who is assigned to over see social security?

The Social Security Administration.


Security Rules?

Visitors are prohibited from violating or attempting to violate the security of the Web site, including, without limitation,


The practice that would entice a human being to violate an organization's security policies?

social engineering


What is practice that would entice a human being to violate an organization's security policies?

Social engineeringCollusion


What would be a violation of someones first amdendment rights?

A situation that would violate the 1st amendment would be stifling free speech.


What practice would entice a human being to violate an organization's security policies?

This type of malware is designed to bypass the normal authentication process


Is it illegal to hack a runescape account?

Yes. It can be construed as theft at the very least. It could violate Federal Laws for cyber-security as well.


What practice that would entice a human being to violate an organization's security policies?

Social engineering tactics, such as phishing emails or baiting attacks, can entice a person to violate an organization's security policies by tricking them into compromising sensitive information or giving unauthorized access. Manipulating individuals through deception or coercion can lead to unintentional security breaches and put confidential data at risk.


What practice entice a human being to violate an organization's security policies?

Common practices that might entice a human to violate an organization's security policies include financial gain, coercion or blackmail, curiosity or espionage, negligence or ignorance of policies, or personal grievances against the organization. These motivations can lead individuals to engage in actions like sharing sensitive information, bypassing security measures, or exploiting vulnerabilities for personal gain or malicious intent.


What is the practice that would entice a human being to violate an organization's security policies?

Social engineering is a practice that can entice a human being to violate an organization's security policies. This involves manipulating individuals through psychological tactics to divulge sensitive information or grant unauthorized access. Common techniques include phishing emails, pretexting, and impersonation.