Operating Systems Security Plan

Industry Standards
Security Risk Assessment and Checklist
Security Scanning Software
Hardening the OS
Enterprise Operating System Security Plan

The flow of information follows models that act as an intelligent filter to control access to an object. Two such models are the Bell-LaPadula and Biba. Complete the following:

Describe the properties and mandatory controls of each.
What are the differences and similarities of each model?