A law enforcement organization which manages an information system
- Consider a law enforcement organization which manages an information system with extremely sensitive
investigative information. Give examples of confidentiality, integrity, and availability requirements associated
with the information system. Provide a priority or degree of importance for each requirement. - What are the main stages in an evaluation of an IT product against a trusted computing standard, such as
the Common Criteria? - List and briefly describe three security architecture frameworks.
- Explain the difference between certification rules and enforcement rules in the Clark Wilson Model.