StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Design and Validation of a General Security Model with the Alloy Analyzer - Case Study Example

Comments (0) Cite this document
Summary
This study "Design and Validation of a General Security Model with the Alloy Analyzer" looks at the system and its weakness when alloy modeling is not in place and then later on we take a look at how alloy modeling has influenced the security level of the system. The system is modeled by the use of alloy modeling while the previous systems were created using other modeling techniques…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Design and Validation of a General Security Model with the Alloy Analyzer
Read TextPreview

Extract of sample "Design and Validation of a General Security Model with the Alloy Analyzer"

Download file to see previous pages This system is secure because of the many advantages that come with alloy modeling. In alloy modeling, the procedures are taken as commands by the system hardware and software and they do exactly as the alloy models command them to do. We are very interested in the way that this will affect the security of the flight control system.
A secure system involves four main concepts which are integrity, confidentiality, authentication, and non- repudiation. Confidentiality is the ability of the system to remain private such that only a user can get access to the important messages that are in his account. Integrity is the ability of the system to enable it to be impossible for another user to change what is in the account of the other user. The security control model that we are discussing here is a good example of a secure system model. Its security is largely attributed to the use of alloy modeling to work on it. Below is the model that we are discussing.
If a valid protected message is known, then it means that this other process knows that there is some other process that has access to it. This prevents it from releasing protected information to the other processes.
If a process knows that another process has received a particular message, then this process must know this message that the other process had. This means that every process has to have its own message security and that there should be no process that knows the information of the other process. If a process knows that some process sent another message then this process must be the sender. This means that every process has to have its own group of processes that send it the messages. Eavesdropping one of the main security breaches is that some processes are able to know the content of a protected message. This means that this process had no access to the message that it is being sent to. Therefore the process violates confidentiality. Another security breach is through corruption. This is where a process that does not have access to a message becomes its source. Therefore it breaches the integrity of the message. Spoofing was also detected to be present and it violated authenticity by sending a protected message somewhere else. Double reception was also a problem that breached non-repudiation. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Design and Validation of a General Security Model with the Alloy Analy Case Study, n.d.)
Design and Validation of a General Security Model with the Alloy Analy Case Study. https://studentshare.org/information-technology/1761450-computer-network-security-analyse-the-use-of-alloy-model-checker-for-a-security-application-of-your-choice-among-a-list-of-relevant-case-studies
(Design and Validation of a General Security Model With the Alloy Analy Case Study)
Design and Validation of a General Security Model With the Alloy Analy Case Study. https://studentshare.org/information-technology/1761450-computer-network-security-analyse-the-use-of-alloy-model-checker-for-a-security-application-of-your-choice-among-a-list-of-relevant-case-studies.
“Design and Validation of a General Security Model With the Alloy Analy Case Study”. https://studentshare.org/information-technology/1761450-computer-network-security-analyse-the-use-of-alloy-model-checker-for-a-security-application-of-your-choice-among-a-list-of-relevant-case-studies.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Design and Validation of a General Security Model with the Alloy Analyzer

Homeland Security Preparedness Model

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Emergency Preparedness Plan: Policy: As per the policy, “In order to manage the effects of natural as well as manmade disasters, including terrorism threats and security issues, which can effect and hinder the organizations or its employees output, the organization will prepare and follow an Emergency Preparedness Program.” Goals: The goals of the plan are ‘to get an organization back up and running in the event of an interruption and to have some contingency plans in the event of a problem.’ A disaster recovery and preparedness plan is there to save the organization so that it can continue to...
8 Pages(2000 words)Research Paper

CRM Model Assessment & Design

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... CRM Model or Contents Current Situation 3 Redesign the Service Policies and Strategies 5 Design Customer Loyalty Strategies and Programs 6 Evaluate Technology-Related Tools (CRM) That Could Support Your Customer Service and Loyalty Programs 10 Apply Metrics That Will Measure the Success of Your Customer Service and Loyalty Programs 11 Conclusion 15 Works cited 16 Current Situation Caribbean Cargo DC, LLC whose headquarters are in Washington, D.C. is a company that deals with shipping and freight services. Its main focus is in Washington, D.C., Virginia and Baltimore Metro areas. In 2007,...
10 Pages(2500 words)Essay

General Linear Model

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... The purpose of this statistical research was three-fold. Firstly it was to explore the use of the R 2.0.0 program in statistical analysis. Secondly, it was to explore the General Linear Model in a case where the response variable is dichotomous. Finally, the research would provide some practical experience for the author in applyling real world data to a research question in the education field, and being able to interprete the results in a meaningful manner. Though the main two purposes for this paper were statistical analysis it is important to understand the research question and all the...
32 Pages(8000 words)Coursework

Model Design

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Off shore Venue: Lecture hall Module: Comparative Education Day Lesson Objectives: By the end of the lesson the learner should be able to 1. Define comparative education 2. Analyze the scope of comparative Education 3. Give and analyze methodological approaches to studying comparative education TIME CONTENT LEARNING ACTIVITY RESOURCE MATERIALS 8:00-8:10 Introduction Students get the course outline Class goes through the course outline and what to cover. Course outline 8:30-9:00 Definition of Comparative Education The instructor takes the students through the various definitions of comparat...
3 Pages(750 words)Essay

Microsoft Baseline Security Analyzer

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear? I didn’t receive a complete security assessment for my personal computer because the MBSA could not complete one or more requested checks. Windows Firewall tests cannot be completed due to an error. All user accounts have non expiring passwords. So my plans are to find out w...
4 Pages(1000 words)Essay

Validation Guidelines

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Guidelines This article examines validation guidelines by offering research heuristics for reinvigorating the search for validity through five methods of validity. These are content validity, construct validity, reliability, manipulation validity, and statistical conclusion validity. Content validity is concerned with representation and the essential question that it poses is if the instrumentation pulls in a representative manner from all the ways that could be utilized in measuring the content of a particular construct. Construct validity involves the operationalization or measurement between...
2 Pages(500 words)Article

Security Design

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Assignment Research Paper Summary The paper d “A systems engineering approach for security system design” (Alston and Campbell, 107-112) was published in the proceedings of the International Conference on Emerging Security Technologies held in 2010. In this paper, the authors have attempted to provide a methodical approach of design to develop security systems. Systems engineering paradigm has been implemented to this approach which is poised to enable a systems designer to comprehend all the contributory factors that lead to a system’s situation and problems. Complex systems that critically...
1 Pages(250 words)Research Paper

Security in Website Design

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... rapid development of Information and Communication Technology (ICT) has led to the unprecedented growth of the World Wide Web both in terms of coverage and importance. The World Wide Web not only covers the entire world today, but is also being increasingly used by a growing majority of people the world over. Financial transactions through the web gave a completely new dimension to information sensitivity on the Web. Each website began to accumulate information or data that could be potentially misused. “Networked computer systems have become critical not only for conventional commercial and fin...
18 Pages(4500 words)Research Paper

Kemp Design Model

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... Explicit of the Kemp Design Model In the earlier period, Instructional Design Models have been developed to ensure that instruction ingeneral can be made more appealing to the learner. The comprehensive Instructional Models have 3 stages which cover analysis, strategy development and evaluation. In the analysis phase, the designers learn as much as they can about the atmosphere in which the learners experience the learning process. As such, in the strategy development phase, the designers establish the way that instructional tools are formulated for the learner’s optimal enhancement (Johnson, ...
6 Pages(1500 words)Case Study

Security Analyzer (MBSA)

...Design and Validation of a General Security Model with the Alloy Analyzer... Design and Validation of a General Security Model with the Alloy Analyzer... alyzer (MBSA) Essay This lab aims to provide the essential skills and knowledge on password security to justify the complexity of the selected policy change for Windows. The primary target is to protect the password from change by unauthorized third parties with the help of the MBSA (Microsoft Security Baseline Analyzer) tool.It is essential to know the password complexity, the password length, the password identity, the minimum password security requirements, the password age, the password storage rules, and the password encryption security requirements. These issues are all important to justify ...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Design and Validation of a General Security Model with the Alloy Analyzer for FREE!

Contact Us