Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Principles of access control
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Principles of access control
4. Security
Security is a very critical issue in many systems, especially distributed systems. This is because the system is distributed across a network over many devices, and so there may be more ways for outsiders to access the system who do not have permission to do such. A security breach is considered to be any time an unsafe state is reached within the system. An unsafe state is one in which data can be illegally intercepted, interrupted, modified, or fabricated. Since a distributed system is made up of various smaller systems with the possibility of each system being managed separately, it becomes very important that all parts of the distributed system be managed uniformly and completely to prevent security breaches. Furthermore, in the case that a security breach has been made on one sub-system, it becomes very possible that the attacker can gain access to other parts of the system. In this case, the attacker may even be able to make it appear that the accesses to the other parts of the system were made legally [1, 6, 7]. Access control, bracket capabilities, and the formal protection model are methods of ensuring a secure and safe distributed system environment.
4.1 Access Control
Access control is described as “the process of regulation of the kind of access (e.g. – read access, write access, no access) an entity has to the system resources” [7]. Access control can therefore prevent and enable parts of the systems to perform certain actions and access specific files and data. Access control lists are used to store the privilege information. Entries are stored in access control lists that specify whether an entity has the right to either access, write, or execute certain sections of a system [8].
A comm...
... middle of paper ...
...a, 2008.
[6] Appelbe, Akyildiz, Benson. A FormalProtection Model of Security in Centralized, Parallel, and Distributed Systems. Georia Institute of Technology. 1990.
[7] Shreyas, Doshi. Software Engineering for Security: Towards Architecting Secure Software. University of California, Irvine, CA. 2001.
[8] Access Control Lists. Microsoft Development Network. Internet: http://msdn.microsoft.com/en-us/library/aa374872(VS.85).aspx. [Oct. 12, 2011].
[9] How Permissions Work. Microsoft TechNet. Internet: http://technet.microsoft.com/en-us/library/cc783530(WS.10).aspx. [Oct. 12, 2011].
[10] Clarskon, Michael. Access Control. Cornell University. Internet: http://www.cs.cornell.edu/courses/cs513/2007fa/NL.accessControl.html. [Oct. 12, 2011].
[11] Evered, Mark. Bracket Capabilities for Distributed Systems Security. University of New England, Armidale, Australia. 2002.
The Operating System (OS) is the heart of computer server and client systems; therefore they are the pivotal components of the Information Technology (IT) architecture. The OS contains the crucial data, information, and applications, which are vulnerable, and can be infiltrated to cripple the entire IT architecture of the organization. Therefore, it becomes mandatory to properly safeguard the OS from an internal or external intrusion (Stallings & Brown, 2012). This critical thinking report will highlight the security concerns that may impact the OS. Further, the security guidelines and best practices for the OS in general, along with the specific fundamentals regarding the Windows and Linux OS are comprehensively illustrated.
Every piece of information must be traceable back to the data input that produced it. The main action of audit trail is captures a sources of all data items at the time of getting entrance into the system. The other constituent of input control and security involves data security rules and measures to protect data from being or lost or damaged. The records retention policy is the practice of storing documents in a safe location and making sure to see to legal requirements or business needs. Input security and control also involves the process of encrypting or encryption of data so only users with the code it software can read
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Security architecture is a major component and part of a system’s architecture and is usually designed to provide important guidance during the development of the system. It usually outlines the assurance level required and in the process outlines the possible impacts that this level of security might have on the development process of the actual system. Since security is a major component for the success of any given business unit, it is necessary to have a fully functional and operative security system that meets all the necessary requirements for any organization. Some leading business firms are usually faced with the task of achieving and maintaining high security measures and methods. SecureTek one of the leading provider of security solutions is faced with the challenge of redesigning their security architecture to assure security to the data and the other firm’s valuable assets as well as ensuring security to their customers and employees who encounter risky situations when visiting this business unit.
Diffie, Whitfield. (2008). Information Security: 50 Years Behind, 50 Years Ahead. Communications of the ACM. 51(1), 55-57.
Glaser , C. L. (1997). The Security Dilemma Revisited. Cambridge University press, 50(1), 171-201. Retrieved from http://www.gwu.edu/~iscs/assets/docs/cg-docs/SecurityDilemma-WP-1997.pdf
Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Boston, Mass: Thomson Course Technology.
Understanding the access control is the first step to secure any system, following
For an in-depth defence approach, case study provides a series of things that describe about what is working nowadays for a secure data.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth. Due to the multitude of security devices and device categories available, it can be very difficult to identify the correct tools for meeting security goals. Using the Defense in Depth strategy will require an understanding of the interactions between devices occuring within the network.
These controls are logical access controls that are used for “identification, authentication, authorization and accountability” (Whitman & Mattord, 2013). As with many systems proper preparedness documents are crucial. There has to be a plan in the event of a disaster such as an
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.