Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry, a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model necessary to establish trust between sharing partners. In the trust model used by him, the first organization makes use of a body of evidence in a second organization, and the level of trust between two organizations depends on the degree and quality of evidence provided by the first organization.
Which of the following types of trust model is used by Garry to establish the trust?
In the trust model described, where trust between two organizations depends on the degree and quality of evidence provided by the first organization, the model in use is 'Validated Trust.' This model relies on the validation of evidence or credentials presented by one party to another to establish trust. The validation process assesses the credibility, reliability, and relevance of the information shared, forming the basis of the trust relationship between the sharing partners. This approach is common in threat intelligence sharing where the accuracy and reliability of shared information are critical. Reference:
'Building a Cybersecurity Culture,' ISACA
'Trust Models in Information Security,' Journal of Internet Services and Applications
Sharan
1 months agoSherron
3 days agoTamekia
7 days agoRashida
1 months agoCaren
1 months agoAllene
1 months agoYolando
2 months agoDenna
24 days agoGilbert
1 months agoClorinda
2 months agoCammy
21 days agoDenae
22 days agoEric
26 days agoAretha
2 months agoTrevor
2 months agoMerlyn
20 days agoEileen
24 days agoAlonzo
29 days agoWenona
1 months agoLenora
2 months agoCatherin
21 days agoCarmela
1 months agoSerita
1 months ago