StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Architecture & Design models - Assignment Example

Cite this document
Summary
In the paper “Security Architecture & Design models” the author analyzes security of an information system, which is the assurance that an information system components are prevented from unauthorized entry, manipulation of data. Security safeguards against destruction of those systems components.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Security Architecture & Design models
Read Text Preview

Extract of sample "Security Architecture & Design models"

Security Architecture & Design models Security of an information system is the assurance that an information system components are prevented from unauthorized entry, manipulation of data. Security also safeguards against destruction of that systems components like data or resources. Elements of an information system that needs to be secured include file or data, resources like computers, hard drives, and other peripheral networking components. Securing an information system requires that security architecture be created by the management of the information system. Security architecture, therefore, is a comprehensive security design that will ensure that a system has the correct authentication, authorizations and proper preventive measure against system attacks and vulnerabilities. Coming up with the best security architecture requires the management of an organization to perform a risk assessment and management process in order to come up with the best security model to secure the system. The risk assessment will identify the extent of the system if the system is large with interrelated components, the data locations and storage of the system. Determining if the system uses the Internet for functions like data transfer and identifying all the resources and hardware components being utilized by the system. The risk assessment will identify the potential risks that a system can have or might face in the future. The management the is aiming to ensure information security should consider the following types of security architecture models. The security models are used to create several access control levels. The security models include access matrix, Bell-Lapadula, Lettice, information flow, Clark-Wilson, the state machine and Biba. The security models contain the following components. Data classification model that facilitates wider sharing of information through ensuring that information have been given additional controls. The model classifies information into several categories like low, medium, high and unclassified. Data security model assist the users in making sure the information is secured in the appropriate manner. The security model creates several security categories for the processes, hardware devices, hard-drives and the various users of the information. Detection model that has several methods of detecting intrusions and vulnerabilities in the information system. Detection models should be up and running at all times in the system. Prevention model ensures that information in a system is prevented from unauthorized access whether from external sources or internal users who have different access level. The management of an information system should have a monitoring model that ensure that the security architecture models are in line the security policies, technical requirements and the strategies of the organization. Finally, a safety management model should be in place to ensure that there is coordination between the other security models ( detection, monitoring, and prevention). The above security architecture model components have been integrated into many security architecture models. Major information security architecture model include the following; Access Matrix Model Access matrix security architecture model describes the rules and strategies for information access control. The model contains several combination of read, write and execute permissions that can be set to individual files or given to particular users. The model contains access control entries and access control lists. The primary rules for controlling access to a subject are discretionary, mandatory and non-discretionary. The access matrix model mainly focuses on confidentiality of the information and file. Confidentiality in a security model ensures the information and data files are protected from unauthorized access throughout the whole information architecture of a system. Information architecture includes all the data and files associated with security architecture data stores, applications and all the communication and information links or processes. Bell-Lapadula Bell-Lapadula security architecture model is mostly used in multilevel security system. The model has two ground rules. Angelo (2001) says that the simple security rule that ensures that there is no read up. The property law that provides that there is no write down of information. The matrix model provides that an objects or files classification will remain the same when the file or object id being processed by the system. A useful property of Bell-Lapadula model is that, it ensures that a system that if a system starts in a secure way, it will always stay safe. Its primary focus is confidentiality of information. Lattice The lattice model of information security makes sure that each user and each resource of information is connected with one of a tidy set of classes. The categories of information or the levels set for files or users are based on the interaction between several objects and subject and it also uses labels. The lattice model is non-discretionary meaning that the element is the object and subject, and the subject has an upper bound, CISSP (2004). The upper bound of the subject is equal or higher than the upper bound of the information object being accessed by a user or an information system. State Machine Model State machine is security control access model that allows operating systems ( Linux or Windows operating system ) to transition only between series of well-defined states. The defined states have been set to ensure total security of the information files. The model focuses primarily on the confidentiality of the data and information. Biba Model From CISSP study guide, we learn that Biba security architecture model is very similar to Bell-Lapadula. It also contains only two primary rules of integrity axiom that ensures there is no write up of information, and the role of simple integrity that ensures there is no read down of information. The primary focus of Biba model is integrity. Integrity ensures that information, service, resources and data are not destroyed or altered in an unauthorized manner, Angelo (2001). Information Flow Model The model ensures that all the object, data, information, and files are assigned security values and classes. The information flow model will ensure that the information only flows in a direction that the security policy permits. The information flow model consists of state transitions, lattice states, and objects. Its primary focus is on the hidden information channel analysis. Clark and Wilson Clark-Wilson model makes sure that there is the separation of duties. Separation of duties ensures that there is data or information integrity. It has requirements that ensure that objects ( data files ) are only accessed through programs Angelo (2001). It's central aim id to ensure data integrity. The primary elements of Clark-Wilson model are: Users who are the active agents Transformation procedures – this are abstract operation like write, read and modify that have been programmed. Constrained data items that are only manipulated by transformation procedures. Unconstrained data elements can be managed by users through read and write operations. Integrity verification procedures that checks for constrained data items consistency with external reality. Graham-Denning Model The Graham-Denning model defines different sets of rights or commands that a subject can execute on an individual subject. The eight fundamental protection rights that determine how functionalities should take place include: How to securely create an object or a subject. How to safely delete and object or a subject. How a system user can safely provide and issue the grant access right. How information system can securely allocate the Delete access right. How to securely assign transfer access right. The management of information must ensure that the implementation of any of the following models will provide information security. The models must make sure that the system operates in different modes in regards to data sensitivity, clearance level of users and authorization level. Most importantly the model must incorporate information security, risk detection, data management and it should have several ways of classifying data into several sections. Reference Scott M. Angelo, (2001). SANS Security Essentials: Security Architecture Model Component Overview. Retrieved From http://www.sans.org/reading-room/whitepapers/auditing/security-architecture-model-component-overview-sans.pdf CISSP, (2004). Study Guide: Security Architecture and Design. Retrieved From https://www.isc2.org/cissp-training.aspx CISSP, (2004). All-in-one Exam Guide: Security architecture and design . Retrieved From https://www.isc2.org/cissp-training.aspx Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Architecture & Design models Assignment”, n.d.)
Retrieved de https://studentshare.org/information-technology/1681906-appraise-the-various-types-of-security-architecture-design-models
(Security Architecture & Design Models Assignment)
https://studentshare.org/information-technology/1681906-appraise-the-various-types-of-security-architecture-design-models.
“Security Architecture & Design Models Assignment”, n.d. https://studentshare.org/information-technology/1681906-appraise-the-various-types-of-security-architecture-design-models.
  • Cited: 1 times

CHECK THESE SAMPLES OF Security Architecture & Design models

What is Technology, Green Architecture and Green Electricity

 Architect Magazine: Architectural design | Architect Online: A premier site for Architecture Industry News & Building Resources.... reen architecture is highly crucial in 21st century because it allows architectures to create solid foundation of building at a micro level.... The concept of nanotechnology has became a crucial aspect for creating architecture since it is a fairly new idea.... The whole is undoubtedly a vital components for organization as it upholds security, embeds flexibility and allows corporations to implement a modern IT system....
2 Pages (500 words) Essay

Managing Secuity in Prisons

it is clearly overt that prisons have intrinsic weaknesses that always result into unwanted constraints in terms of… Moreover, these weaknesses may be evident due to prison design concerns and loopholes in control of prison physical security.... Its design was erected by other numerous prisons worldwide.... More typically, though, the separate system refers to a precise jail architecture created to support that system (Cole, 2012).... Therefore, this document encompasses a study that explicates on the prison architectural designs and the various legislations and The paper ends in a conclusion that offers the reader a second thought in the effort towards ensuring more favourable and habitable surroundings and security conditions within the prisons....
8 Pages (2000 words) Research Paper

Software Design

Software architecture, as defined by Shaw and Garlan (1996), includes a set of crucial decisions concerning the software system organization techniques such as the selection of structural elements and their interfaces; expected behaviors among the defined elements; composition… performance, comprehensibility, usability, aesthetic issues, resilience and economic/technical constraints; and architectural guiding styles for the organization. Software Architecture is also the structure Software design Software design Where software architecture ends and software design begins....
2 Pages (500 words) Essay

Software Design

These are; system formulation, requirement definition, architecture design, detailed design, implementation, system test and deployment.... Then we integrate these details into the software architecture design and evaluation methods.... The early models only focused on what is to be done.... They emerge from the interactions between usability design principles and software development principles.... They emerge from the interactions between usability design principles and software development principles....
2 Pages (500 words) Essay

Design of a Video Rental System

This design consists of sets of models The main content areas of an information system are data, process, infrastructure and organization.... The design needs to specify the working of the program.... The design documentation should serve as its maintenance manual to the common users.... The design… The design matches the requirements of the program to the computer language.... The technique used to deliver the design is modeling....
4 Pages (1000 words) Essay

The Home in Which We Are All Intended to Have a Right

This coursework "The Home in Which We Are All Intended to Have a Right" focuses on the modern painting that has now reached the levels of entering into collaborations with architecture.... It arrives at this point since the expression of architecture purifies these levels.... In developments of new architecture, Le Corbusier argues that the developments of houses and homes are quite explicit.... He points out architecture to be the period of bringing revision in values in the modern homes....
12 Pages (3000 words) Coursework

Enterprise Information Architecture

Besides this, logical operational models show the unique attributes of an entity or combination of unique attributes by the use of a primary key.... The focus of this paper is on Enterprise Architecture is a comprehensive compilation of an organization's operational frameworks, its design, functionality, interrelation, and applications.... Key Performance Indicators (KPI), help in an overhead analysis of the performance of the architectural design....
6 Pages (1500 words) Assignment

Design, Engineering and Architectural Technologies

There is a simple architectural design that can be used even by laymen presented by the author of this paper "design, Engineering, and Architectural Technologies".... This design batches its data thereby making the system lighter.... nbsp;This architectural design is not very sophisticated hence its preference.... nbsp; The design allows for multiple users making it ideal for a simple work office with various employees....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us