International Journal of Social Science & Economic Research
Submit Paper

Title:
SOFTWARE SYSTEMS SECURITY IMPLICATION UTILIZING THE BELL-LAPADULA MODEL

Authors:
Jaden Cutinha

|| ||

Jaden Cutinha
North Creek High School, Bothell, Washington

MLA 8
Cutinha, Jaden. "SOFTWARE SYSTEMS SECURITY IMPLICATION UTILIZING THE BELL-LAPADULA MODEL." Int. j. of Social Science and Economic Research, vol. 8, no. 1, Jan. 2023, pp. 177-182, doi.org/10.46609/IJSSER.2023.v08i01.012. Accessed Jan. 2023.
APA 6
Cutinha, J. (2023, January). SOFTWARE SYSTEMS SECURITY IMPLICATION UTILIZING THE BELL-LAPADULA MODEL. Int. j. of Social Science and Economic Research, 8(1), 177-182. Retrieved from https://doi.org/10.46609/IJSSER.2023.v08i01.012
Chicago
Cutinha, Jaden. "SOFTWARE SYSTEMS SECURITY IMPLICATION UTILIZING THE BELL-LAPADULA MODEL." Int. j. of Social Science and Economic Research 8, no. 1 (January 2023), 177-182. Accessed January, 2023. https://doi.org/10.46609/IJSSER.2023.v08i01.012.

References

[1]. "Introduction To Classic Security Models." Geeks for Geeks, 11 July 2022, www.geeksforgeeks.org/introduction-to-classic-security-models/. Accessed 2 Jan. 2023.
[2]. "Protecting Your System: Software Security." NCES, nces.ed.gov/pubs98/safetech/chapter7.asp. Accessed 2 Jan. 2023.
[3]. Shen, HongHai. "Bell LaPadula Model." The University of North Carolina at Chapel Hill, www.cs.unc.edu/~dewan/242/f97/notes/prot/node13.html. Accessed 2 Jan. 2023.

ABSTRACT:
Due to the multitude of security problems prevailing in society, software and systems security has grown exponentially over the past few years. To combat the issues that arise, there have been a host of approaches that have been attempted to implicate. Current research initiatives through CSS focus on data virtualization security as well as other research including memory forensics. Through this, a relationship has been established that connects them to implications in real-world systems. The main purpose of this remains to implement walls for the prevention of attacks and to remain functional despite extenuating circumstances. The ability to withhold malicious attempts into accessing important data is crucial in the prevention of information loss. In this project I have discussed the model, Bell-LaPadula, that is administered for security. The studies in correlation might align with a potential information security protection that will securely assist in the prevention of the exploitation of a user’s privacy.

IJSSER is Member of