Question

In: Computer Science

discuss role of security models in implementing security policy in a software application

discuss role of security models in implementing security policy in a software application

Solutions

Expert Solution

Role of security models in implementing security policy in a software application are as follows:-

  • Security models are the most important part to keep up with the changing business and technology environment due in part to the nature of today’s system infrastructure. Current system infrastructures require constant change due to device customization, application enhancements, fixing security risks, cloud computing, and constant hardware and software upgrades in a software application.
  • In terms of Java:- The Java security model provides policy-based access controls for Java applications. This security model provides protection based on the physical origin of the classes in use as well as identity services supported by their digital signature. The Java Authentication and Authorization Service APIs further extend the Java security model by allowing an application at runtime to take into account a user's identity. These APIs make a powerful combination for custom authentication and authorization in your Web service.
  • The most important part of security model in implementing security policy is that this helps in describing security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. ... Application security may include hardware, software, and procedures that identify or minimize security vulnerabilities.

NOTE :- This answer is lengthy because there is alot of things to learn about the security models, so read it thoroughly and if any problem persist let me know through the comment section


Related Solutions

Discuss the role of a central bank in a country, particularly in implementing monetary policy. Comment...
Discuss the role of a central bank in a country, particularly in implementing monetary policy. Comment on any regulatory requirements imposed on the central bank in performing their responsibilities. Comment on the current economic environment (inflation and interest rates) of your selected country, monetary policy employed by the central bank, and effects of those monetary policies on financial markets including asset values and yields. In the article ‘RBA joins race to the bottom’ (Greber & Shapiro 2016) the Reserve Bank...
Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss Web Site Security and also Define and discuss Web Application Security.
discuss why implementing optimization models can be challenging. operations research
discuss why implementing optimization models can be challenging. operations research
Application Security & Backup/Recovery Looking at the Cherwell software. 3.5.1. In respect to recovery, is there...
Application Security & Backup/Recovery Looking at the Cherwell software. 3.5.1. In respect to recovery, is there is a time objective for restoring the system after a disruption? 3.5.2. Is there a service level objective when restoring the system? 3.5.3. Is there a certain amount of data (like 3 hours or days of transactions) that can be considered an acceptable (tolerable) interim loss from a disruption to the system?
The security for application software is enhanced and optimized through a procedure called threat modeling. In...
The security for application software is enhanced and optimized through a procedure called threat modeling. In major applications, such as those used by manufacturing, banking, or distribution companies, that do scheduling, resource management, inventory management, accounting, and more, security is a crucial element of its operations. Research threat modeling and briefly describe a procedure you would recommend to provide robust security for a major application in this type of environment
What is the role of software security testing in the process of finding solutions to system...
What is the role of software security testing in the process of finding solutions to system vulnerabilities
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security,...
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security, this includes social engineering.
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail....
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail. Describe how vital these models are to the security and information security services as a whole. How are security services linked, and how do they support the security of information? Q2. You offer storage services as a corporation and own a data warehouse estimated at USD 5,000,000 (including information & infrastructure). It is expected that 80% of the warehouse (including customer data) would be...
Discuss about the existing e-commerce application using by Toyota and how discuss the security of the...
Discuss about the existing e-commerce application using by Toyota and how discuss the security of the electronic and mobile commerce application
Outline the major security issues related to mobile application technologies and Develop a policy and procedure...
Outline the major security issues related to mobile application technologies and Develop a policy and procedure for one of the major security issues you outlined
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT