(B) Choose the correct answer.
(a) The access matrix model can be used to prevent the Trojan Horse problem related to confiden-
tiality if we disallow owners of objects from providing access rights to other subjects.
(b) BLP rules are necessary in providing protection against the Trojan Horse problem for confi-
dentiality.
(c) BLP rules together with BIBA rules are necessary and sufficient to provide protection against
the Trojan Horse problem for confidentiality.
(d) All of the above
(e) None of (a), (b) or (c)
(f) Both (a) and (b)
(g) Both (b) and (c)
(h) Both (a) and (c)



Answer :

The correct answer to the question is (e) None of (a), (b), or (c). Here's an explanation for each option: (a) The access matrix model can be used to prevent the Trojan Horse problem related to confidentiality if we disallow owners of objects from providing access rights to other subjects. - This statement is incorrect because the access matrix model itself does not address the Trojan Horse problem. It mainly focuses on access control policies and permissions for subjects to access objects. (b) BLP rules are necessary in providing protection against the Trojan Horse problem for confidentiality. - This statement is incorrect as well. The Bell-LaPadula (BLP) model primarily deals with confidentiality and focuses on preventing unauthorized disclosure of information, but it does not specifically address the Trojan Horse problem. (c) BLP rules together with BIBA rules are necessary and sufficient to provide protection against the Trojan Horse problem for confidentiality. - This statement is also incorrect. While both BLP (Bell-LaPadula) and BIBA models contribute to access control and integrity policies, they do not directly solve the Trojan Horse problem related to confidentiality. Therefore, the correct answer is (e) None of (a), (b), or (c) since none of the options accurately address the prevention of the Trojan Horse problem specifically in relation to confidentiality.

Other Questions