StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Design - Research Paper Example

Cite this document
Summary
The paper titled “A systems engineering approach for security system design” (Alston and Campbell, 107-112) was published in the proceedings of the International Conference on Emerging Security Technologies held in 2010. In this paper, the authors have attempted to provide a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Security Design
Read Text Preview

Extract of sample "Security Design"

Assignment Research Paper Summary The paper d “A systems engineering approach for security system design” (Alston and Campbell, 107-112) was published in the proceedings of the International Conference on Emerging Security Technologies held in 2010. In this paper, the authors have attempted to provide a methodical approach of design to develop security systems. Systems engineering paradigm has been implemented to this approach which is poised to enable a systems designer to comprehend all the contributory factors that lead to a system’s situation and problems.

Complex systems that critically need fool proof security solutions include battlefield defences systems, money transaction system, international telephone system, etc. With the lapse of time, system complexities in such environments are rapidly increasing and traditional security paradigms are becoming insufficient. The authors remark that although the “common V model” (108) framework of determining a system’s lifecycle can still be used as a general starting point, systems thinking must be inducted widely.

In order to develop and implement systems thinking to the sphere of complex systems, the systems designer must have a thorough understanding of his/her operational environment. Understanding the subsystem components, hierarchy situation, functional constraints, etc. are also equally important. To achieve this, Alston and Campbell also suggested that the systems designer should develop a range of potential solutions (110). This action can be achieved when divergent thinking and convergent thinking are coalesced with the help of spray diagrams, multiple cause diagrams, etc.

Next, systems level designs and techniques must be produced. After that, the implementation scheme must be verified with the help of the techniques like software and hardware testing, validation, etc. Finally, the designing team must adhere to the most flexible “Systems Engineering policies, processes and tool sets” (Alston and Campbell, 112) that can be used and modified during security emergencies.Work CitedAlston, Ian and Simon Campbell. “A systems engineering approach for security system design.

” Proceedings of the 2010 International Conference on Emerging Security Technologies. New York: IEEE, 2010. 107-112. Print.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Design Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Security Design Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1616781-security-design
(Security Design Research Paper Example | Topics and Well Written Essays - 250 Words)
Security Design Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1616781-security-design.
“Security Design Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1616781-security-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Design

24 hours surviliance

The Security Design of the facility would therefore inculcate security amongst the people and help prevent criminal activities inside and outside the facility.... 9/11 event has exposed the general public to huge ramifications of security issues and highlight their vulnerability against acts of arson, violence and other forms of emergency situations.... Surveillance of buildings and 9/11 event has exposed the general public to huge ramifications of security issues and highlight their vulnerability against acts of arson, violence and other forms of emergency situations....
2 Pages (500 words) Case Study

Problem statement

Information Security: design, Implementation, Measurement, and Compliance.... The problem of cyber crime continues to be an issue in network security, drawing back the trust that several clients have to engage in electronic commerce transactions.... Efforts continue to be put in by the computer security experts including state institutions such as the Bureau… But it remains open secret that most of the interventions being put into the fight of cyber insecurity has failed because of how sophisticated cyber Information security Problem ment INFORMATION security PROBLEM MENT The problem of cybercrime continues to be an issue in network security, drawing back the trust that several clients have to engage in electronic commerce transactions....
1 Pages (250 words) Research Proposal

Implementing Secure Linux Database System

y RoleACME Software Solutions have employed me as an external security contractor in order to assist it re-formulates the Security Design of its database.... Basically, they design websites that introduce the majority of Implementing a Secure Linux DatabaseIntroductionACME Software Solutions is a corporate that specializes in developing websites for business enterprises that can either be large or small.... Basically, they design websites that introduce the majority of customers to the services and commodities that are being provided by their clients....
7 Pages (1750 words) Assignment

AutoXpress Car Rental System-Design Phase

ample of the Report layout to display registered vehicles Sample report layout to display currently rented vehicles Sample report layout to display current CustomersSystem Security Design The database will contain two user levels which are the administrator and the Customers.... … The paper "AutoXpress Car Rental System-design Phase" is a perfect example of a case study on management.... The paper "AutoXpress Car Rental System-design Phase" is a perfect example of a case study on management....
5 Pages (1250 words) Case Study

Security in Computing

… The paper "security in Computing" is a wonderful example of an assignment on information technology.... Confidentiality, integrity, and availability (CIA) are the major principles that need to be considered while designing security policies in order to counteract security threats for instance interruption, interception, fabrication, and modification.... The paper "security in Computing" is a wonderful example of an assignment on information technology....
6 Pages (1500 words) Assignment

Security Design for the Smith-Brooks Corporation

"Security Design for the Smith-Brooks Corporation" paper addresses how modern technologies can be equipped to develop more effective security systems.... This means before the design phase, an in-depth analysis of the site should be conducted identifying both the strengths of the location as well as the vulnerabilities.... The role at hand is to design a security system that uses current technological concepts to safeguard against rising security threats for The Smith-Brooks Corporation, a well-established production company that specializes in designing and developing integrated circuits for major electronic companies....
12 Pages (3000 words) Case Study

Security Design for a Threat Detection System for the Smith-Brooks Corporation

… The paper "Security Design for a Threat Detection System for the Smith-Brooks Corporation" is a delightful example of a case study on information technology.... The paper "Security Design for a Threat Detection System for the Smith-Brooks Corporation" is a delightful example of a case study on information technology.... The assurance of the project's Security Design would still depend on the impact that the Security Design project's success and the positive impacts....
12 Pages (3000 words) Case Study

Security Design for Threat Detection System Employing Relevant Technologies

… The paper "Security Design for Threat Detection System Employing Relevant Technologies " is a good example of a case study on information technology.... nbsp;  The paper "Security Design for Threat Detection System Employing Relevant Technologies " is a good example of a case study on information technology.... Overview Architectures as well as other designers of buildings ought to have a starting point when it comes to the incorporation of the function of security into the design of the building (Glacier, n....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us