Question

In: Computer Science

A good security system must be secured at multiple layers such as 1) database, 2) computer...

A good security system must be secured at multiple layers such as 1) database, 2) computer and 3) network. Compare the differences among these three layers. Provide one security example for each and one scenario that involves all of them.

Solutions

Expert Solution

As per your question, First I will explain how a well secure system is secured by multiple layers of securities. Second, I will compare these layer securities. Further, I will provide an example for each layer of security and one scenario that covers all of these. So, please bear with me:-

The basic concept of inheriting and implementing the multiple layers of security for any computer is to prevent and stop cyberattacks on different levels, so attackers or intruders never reach the core of the system and essential sensitive data. As shown in the below figure:-

Generally, there are three layers of security provided in order to prevent and stop the attackers or intruders:-

1. Database Security Layer: All important security at the database layer occurs within the database itself or in the database management system, where the data live. This layer of security mainly consists of Masking, Tokenization, and Encryption of the data techniques.

2. Computer Security Layer: Nowadays, securing a computer or personal computer(PC) is very difficult because there is a penalty of options available for intruders to get your sensitive data access that leads to data security breaches.

Followings are some best practices in the layer:-

  • Computer Application Whitelisting − A simple idea is to install just a limited number of genuine applications only in your computers, that's are regularly used by you.
  • Computer and Network Authentication − Any data that is accessed through remote access to the network is best to be accessed only by authorized users. And the user authorization is done based on the secret and valid credentials only.
  • File, Disk, and Removable Media Encryption − Generally the cyber experts recommend that we need to encrypt hard disks or removable devices, the basic idea behind this is in the worst case your laptop or your removable USB is stolen by an attacker/intruder and He tries to access the data from these devices by plugging in another machine it cannot be read. For example, Truecrypt - A tool for encrypting the removable USB as well as Hard disks.

3. Network Security Layer: Network Security is very essential for every internet user because it will provide you a secure environment for web suffering or searching in any network. You can use a VPN (Virtual Private Network) application to achieve this. The well-known framework developed and proposed for ensuring security at the network layer is Internet Protocol Security (IPsec).

For example, A secured environment for internet users is shown below:-

I hope, now you have a brief understanding of the multiple layers of securities inherited or implemented in order to protect internet users from attackers or intruders, Including the Database Security Layer, Computer Security Layer, and Network Security Layer.

Please don't forget to like it...

Thank You...


Related Solutions

1. What is required for an enforceable security interest? 2. What happens when two secured parties...
1. What is required for an enforceable security interest? 2. What happens when two secured parties claim security interests in the same collateral? 3. What types of property are exempt from attachment or levy of execution? 4. Who can use Chapter 7? 5. What is the essential difference between bankruptcy under Chapter 7 and bankruptcy under Chapter 11?
Discuss the disadvantages of a distributed database management system (DDBMS), in terms of “Security”.
Discuss the disadvantages of a distributed database management system (DDBMS), in terms of “Security”.
True/False: A primary goal of a database system is to share data with multiple users
True/False: A primary goal of a database system is to share data with multiple users
Hello, this only multiple choice Thanks 1. Juan Foods purchases a computer system in 2015 for...
Hello, this only multiple choice Thanks 1. Juan Foods purchases a computer system in 2015 for $20,000. Its expected useful life is 5 years. At the end of 2015, it has to record depreciation on the computer system of $2,000. What is the correct journal entry to record the depreciation? *   
Debit computer system $2,000; credit depreciation expense $2,000 *   
Debit accumulated depreciation $2,000; credit computer system $2,000 *   
Debit depreciation expense $2,000; credit accumulated depreciation $2,000 *   
Debit computer...
1.Create a Database in Access with the information The database must include: Database name: Monaco Enterprise  Mark...
1.Create a Database in Access with the information The database must include: Database name: Monaco Enterprise  Mark Johnson #87451 Table name: Contacts Delete the Primary key. Fields name and data type are (remember to choose the data type): Field Name Data Types Employee Name Short text Name Short text Last Name Short Text Work Yes/No 2.Go to the “Datasheet View” and enter the data. * Remember to save the table. 3.Move the last name field after the employee name. 4.The (data)...
In a computer system with multiple types of memory (such as RAM and ROM), how does...
In a computer system with multiple types of memory (such as RAM and ROM), how does the computer identify where memory is stored?
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
There are four conditions that must hold simultaneously in a computer system for a deadlock to...
There are four conditions that must hold simultaneously in a computer system for a deadlock to occur. Name each condition and explain what it means.
Pick three security concerns of database system and explain how you would address them.
Pick three security concerns of database system and explain how you would address them.
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function,...
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function, we would like to jump to the execve() function to execute "/bin/sh". Please describe how to do this. You are allowed to have zeros in your input (assume that memcpy() is used for memory copy, instead of strcpy())
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT