A 5 5 page essay exploring the HRU model in information security. Definitions are included and the model is assessed. 5 sources are listed.