In this exercise you will explore a security model. All of them will provide a better understanding of how security enters into computer architectures and operating system design. Choose one of the models below providing a minimum of 3 pages (not including the title page, abstract and reference page): History of the model, How is the model implemented, what are the known barriers, how to bypass barriers and other pertinent information.