The Chinese Wall security policy considers four layers of abstraction
Files, objects, companies groups and conflict classes
Military security policy consists of the following sensitivity levels
Top secret, secret, confidential, restricted and unclassified
Secrecy and integrity
Different approaches to designing security models
Examples of ethical dilemmas in computer security
i. The right for anyone to encrypt data with hard encryption
ii. Providing backdoors to otherwise secure computer systems