The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects:
This article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
Find editors who have shown interest in this subject and ask them to take a look here.
The link to the "Guide to CISSP" page, within the External Links section, points to a search results page which itself returns no results. I would suggest that the link is amended to instead point to the following page, still within the "Guide to CISSP" site: www.guidetocissp.com/search/label/Security%20Models%20and%20Architecture
Happy to hear comments from other Wikipedians on this.
The sentences 'A computer security model is a scheme for specifying and enforcing security policies' and 'A computer security model is implemented through a computer security policy' seem to convey opposite ideas.