<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Computer_security_policy</id>
	<title>Computer security policy - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Computer_security_policy"/>
	<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Computer_security_policy&amp;action=history"/>
	<updated>2026-04-22T08:47:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wiki.sarg.dev/index.php?title=Computer_security_policy&amp;diff=590182&amp;oldid=prev</id>
		<title>imported&gt;Kvng: avoid unnec redirects. caps. format endmatter.</title>
		<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Computer_security_policy&amp;diff=590182&amp;oldid=prev"/>
		<updated>2025-01-27T13:55:30Z</updated>

		<summary type="html">&lt;p&gt;avoid unnec redirects. caps. format endmatter.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Cleanup rewrite|date=August 2013}}&lt;br /&gt;
&lt;br /&gt;
A &amp;#039;&amp;#039;&amp;#039;computer security policy&amp;#039;&amp;#039;&amp;#039; defines the goals and elements of an organization&amp;#039;s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines  whether a computer system is &amp;#039;&amp;#039;secure&amp;#039;&amp;#039; or &amp;#039;&amp;#039;insecure&amp;#039;&amp;#039;. These formal policy [[Computer security model|models]] can be categorized into the core security principles of confidentiality, integrity, and availability. For example, the [[Bell–LaPadula model]] is a &amp;#039;&amp;#039;confidentiality policy model&amp;#039;&amp;#039;, whereas the [[Biba model]] is an &amp;#039;&amp;#039;integrity policy model&amp;#039;&amp;#039;.&amp;lt;ref&amp;gt;{{Cite web |title=What is a Security Policy? - Definition from SearchSecurity |url=https://www.techtarget.com/searchsecurity/definition/security-policy |access-date=2022-07-12 |website=SearchSecurity |language=en}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Formal description ==&lt;br /&gt;
If a system is regarded as a [[finite-state automaton]] with a set of transitions (operations) that change the system&amp;#039;s state, then a &amp;#039;&amp;#039;security policy&amp;#039;&amp;#039; can be seen as a statement that partitions these states into authorized and unauthorized ones.&lt;br /&gt;
&lt;br /&gt;
Given this simple definition, one can define a &amp;#039;&amp;#039;secure system&amp;#039;&amp;#039; as one that starts in an authorized state and will never enter an unauthorized state.&lt;br /&gt;
&lt;br /&gt;
== Formal policy models ==&lt;br /&gt;
&lt;br /&gt;
=== Confidentiality policy model===&lt;br /&gt;
* [[Bell-La Padula model]]&lt;br /&gt;
&lt;br /&gt;
=== Integrity policies model===&lt;br /&gt;
* [[Biba model]]&lt;br /&gt;
* [[Clark-Wilson model]]&lt;br /&gt;
&lt;br /&gt;
=== Hybrid policy model===&lt;br /&gt;
* [[Chinese wall#Computer science|Chinese wall]] (Also known as [[Brewer and Nash model]])&lt;br /&gt;
&lt;br /&gt;
== Policy languages ==&lt;br /&gt;
To represent a concrete policy, especially for automated enforcement of it, a language representation is needed. There exist a lot of application-specific languages that are closely coupled with the security mechanisms that enforce the policy in that application.&lt;br /&gt;
&lt;br /&gt;
Compared with this abstract policy languages, e.g., the [[Type enforcement|Domain Type Enforcement]]-Language, is independent of the concrete mechanism.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Anti-virus]]&lt;br /&gt;
* [[CIA triad|Information Assurance - CIA Triad]]&lt;br /&gt;
* [[Firewall (computing)]]&lt;br /&gt;
* [[Protection mechanisms]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
{{refbegin}}&lt;br /&gt;
* {{cite book&lt;br /&gt;
 | last = Bishop | first = Matt&lt;br /&gt;
 | title = Computer security: art and science&lt;br /&gt;
 | publisher = Addison-Wesley&lt;br /&gt;
 | year = 2004&lt;br /&gt;
 }}&lt;br /&gt;
* {{cite encyclopedia&lt;br /&gt;
  | last = McLean&lt;br /&gt;
  | first = John&lt;br /&gt;
  | title = Security Models&lt;br /&gt;
  | encyclopedia = Encyclopedia of Software Engineering&lt;br /&gt;
  | volume = 2&lt;br /&gt;
  | pages = 1136–1145&lt;br /&gt;
  | publisher = John Wiley &amp;amp; Sons, Inc&lt;br /&gt;
  | location = New York&lt;br /&gt;
  | year = 1994 }}&lt;br /&gt;
*Clark, D.D. and Wilson, D.R., 1987, April. A comparison of commercial and military computer security policies. In &amp;#039;&amp;#039;1987 IEEE Symposium on Security and Privacy&amp;#039;&amp;#039; (pp.&amp;amp;nbsp;184–184). IEEE.&lt;br /&gt;
{{refend}}&lt;br /&gt;
&lt;br /&gt;
{{DEFAULTSORT:Computer Security Policy}}&lt;br /&gt;
[[Category:Computer security procedures]]&lt;br /&gt;
[[Category:Computer security models]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Kvng</name></author>
	</entry>
</feed>