StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Appraising Security Architecture and Design Models - Coursework Example

Cite this document
Summary
The paper "Appraising Security Architecture and Design Models" is a great example of coursework on information technology. A security model illustrates the security policy. Security policy entails aa document that effectively describes protection mechanisms for computers. The security policy entails a security statement of expectations of the system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Appraising Security Architecture and Design Models
Read Text Preview

Extract of sample "Appraising Security Architecture and Design Models"

The paper "Appraising Security Architecture and Design Models" is a great example of coursework on information technology. A security model illustrates the security policy. Security policy entails aa document that effectively describes protection mechanisms for computers. The security policy entails a security statement of expectations of the system. The security model explains the entities governed through the policy; and illustrates rules that form part of the policy (Jonathan, 2008). There are various examples of security models: First, models that illustrate policies for integrity (Clark-Wilson) and confidentiality (Bell-LaPadula). Second, models applying static policies (Bell-LaPadula) and dynamic policies (Chinese Wall); and third, models which are informal (Clark-Wilson) and formal (Bell-LaPadula). 

The Bell-LaPuda Confidentiality Model involves the initial mathematical model with a security policy that is multilevel. The model illustrates a secure state machine, methods of access, and rules of access. The model ensures that users with appropriate clearances (confidential, top-secret, and secret) are adequately authenticated. The model operates on two major rules; the subject cannot access data found at higher levels of security, and a subject cannot pass information to lower levels of security (Zellan, 2003).
The Clark-Wilson Integrity Model describes the integrity of the given information. The model divides data into two: constrained data items that should be effectively protected and unconstrained data items that require less protection (Zellan, 2003). The model prevents unauthorized individuals from further modification of the system. The separation of duties also limits authorized users from initiating improper modifications. The model has effective transactions; which ensure both internal and external consistency.
The Chinese Wall Model ensures access controls which effectively changes, in accordance with the previous actions of the user. The main purpose of the Chinese Wall Model is to safeguard against user’s conflict of interests, during access attempts (Jonathan, 2008). No information is allowed to flow between the subjects and the objects, in a manner resulting in a conflict of interest. The subject can only write on an object, only if the subject is unable to read another object in different sets of data.
A security model is responsible for mapping policy’s abstract goals to the information system through specifying the explicit data structures that are required to implement the security policy (Cashell et al, 2004). The security model is normally illustrated using analytical and mathematical concepts, which are mapped to the specifications of the systems, and developed through the programming code.  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Appraising Security Architecture and Design Models Coursework, n.d.)
Appraising Security Architecture and Design Models Coursework. https://studentshare.org/information-technology/1886722-appraisal-of-security-architecture-design-models
(Appraising Security Architecture and Design Models Coursework)
Appraising Security Architecture and Design Models Coursework. https://studentshare.org/information-technology/1886722-appraisal-of-security-architecture-design-models.
“Appraising Security Architecture and Design Models Coursework”. https://studentshare.org/information-technology/1886722-appraisal-of-security-architecture-design-models.
  • Cited: 0 times

CHECK THESE SAMPLES OF Appraising Security Architecture and Design Models

Telecommunications and Network Security, Application Security and Operations Security

There are networking models that utilize the most significant models that utilize the layered networking approach, and the security approaches for extranet, internet, and intranet; based on intrusion, firewalls, routers protection or detection systems.... Examples of these networking models are the Open Systems Interconnect and the Transmission Control Protocol models (Lambo, 2006).... nbsp; Application security entails the approaches utilized in the code's life cycle in order to prevent security gaps in the security policy of applications, and the underlying system, through errors in design, development, upgrade, maintenance and deployment of the application....
1 Pages (250 words) Coursework

Service-Oriented Design of Badger Brick

… The paper “Service-Oriented design of Badger Brick” is a thoughtful example of the case study on marketing.... The paper “Service-Oriented design of Badger Brick” is a thoughtful example of the case study on marketing.... his paper concentrates on the following of the specific architectural principles for design and service definition focus on specific themes that influence the intrinsic behavior of a system and the style of its design; Service encapsulation, Service loose coupling, Service contract, Service abstraction, Service abstraction, Service reusability, Service composability, Service autonomy, Service optimization, and Service discoverability....
12 Pages (3000 words) Case Study

Project Initiation Documents

he general approach to the implementation of the system will use the conventional system development life cycle (SDLC) which will include project planning and feasibility study, analysis of the system and determination of the systems requirements from a user point of view, the actual design of the system, implementation of the system, integration and testing of the proposed system and finally maintenance of the system (Avison & Guy,2003,45-59)....
14 Pages (3500 words) Case Study

Appraising Markets in China for Industrial Products

nbsp;A Health & Safety Engineering Corporation is a company that specializes in a range of activities including design and construction of dust manufacturing and filtration materials.... nbsp;A Health & Safety Engineering Corporation is a company that specializes in a range of activities including design and construction of dust manufacturing and filtration materials.... … Generally, the paper "appraising Markets in China for Industrial Products" is a great example of a marketing case study....
8 Pages (2000 words) Case Study

Leadership Competency Model: Appraising Capacity to Lead

The logic of selecting this model was bolstered by a critical review of the extant literature on leadership, and intensive reading on the practice of competency modeling largely inferable from available models.... … The paper "Leadership Competency Model: appraising Capacity to Lead" is an outstanding example of a management literature review.... The paper "Leadership Competency Model: appraising Capacity to Lead" is an outstanding example of a management literature review....
8 Pages (2000 words) Literature review

Formatting in Online Advertising - Australian Architecture Association

… The paper "Formatting in Online Advertising - Australian architecture Association " is an outstanding example of a marketing case study.... The Australian architecture Association (AAA) was established in 2004 as a non-profit organisation.... The purpose behind its formation was to promote the knowledge of both the world and the local architecture in Australia.... The paper "Formatting in Online Advertising - Australian architecture Association " is an outstanding example of a marketing case study....
7 Pages (1750 words) Case Study

Challenges of Enterprise and How Enterprise Modelling Helps to Overcome These Challenges

nterprise ModellingAccording to Pereira & Sousa (2008) enterprise modeling refers to the procedure of creating models of an enterprise using process models, data models, resource models, and such.... The basis of enterprise modeling is knowledge regarding the enterprise, earlier models, reference models, in addition to domain ontologies (Sundaram & Wolf, 2009).... nterprise modeling handles the process of understanding an enterprise business and enhancing its performance by creating enterprise models....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us