The Information Security Governance domain entails the identification of an organization's information assets and the development, documentation, implementation, and updating of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability.
Mandatory Access Control is usually implemented in Government and security organization where every data asset is labeled depends on its swnairiciry (how freely it is available). On the other hand, Discretionary Access Control rights are at the discretion of administrator or authority (like a regular operrating system).
Brewer Nash Model is also called as “Chinese Wall”. It is very well suited in database applications where you would like to provide access to your supplier or partner but at the same time would like to keep other data isolated.
OSI model is theoritical and based on 7 layers. TCP/IP is a practical model based on 4 layers only. Though OSI is not practical but it is more referred than TCP/IP protocol stack.
Symmetric Key Cryptography is fasster than Public Key Cryptography.