Question

In: Physics

Today, several security services are increasingly provided as common security services. These include audit and monitoring...

Today, several security services are increasingly provided as common security services. These include audit and monitoring services, authentication services, access management services, directory services, and a variety of detection, prevention, and mitigation services. What is meant by common security services, and what advantage and disadvantage do they provide when compared to commodity security controls?

Solutions

Expert Solution

Common Security Services Manager

This section provides details on the main infrastructure component of the CDSA, the Common Security Services Manager (CSSM).

Overview

The Common Security Services Manager integrates the security functions required by applications to use cryptographic service provider modules (or tokens) and certificate libraries. In particular, it facilitates linking digital certificates to cryptographic actions and trust protocols. Tokens and certificate libraries plug into the CSSM as add-in modules.

Functionally, CSSM provides the services shown in Services Provided by CSSM :

  • General module management services-install, dynamically attach, and dynamically locate module managers and add-in modules.
  • Elective module managers-dynamically extend the APIs and security services available to applications implemented to use those services.
  • Basic module managers-define a minimal set of security services APIs.
  • Multi-service modules-allow a single add-in service module to implement services to functionally separate sets of CSSM APIs.
  • Integrity Services-verify signed credentials to ensure trusted identification and authorizations.
  • Security context management-aggregate and manage input and output parameters required when performing cryptographic operations.

General Module Management Services

CSSM manages a registry that records each component's logical name, attached components in the CSSM environment. CSSM manages a registry that records information about each installed add-in module and elective module manager. This information can be queried by applications, add-in modules, and components of CSSM. The registry is CSSM's critical information base. CSSM must protect this information base by controlling access to the information, (particularly write access), and checking the integrity of stored values upon retrieval.

The CSSM registry records the logical name of each add-in module and elective module manager, the information required to locate and dynamically initiate the component, and some minimal meta-data describing the capabilities and services implemented by the component. An add-in module may or may not implement all of the APIs defined by CSSM. Unimplemented functions are registered as null. For extensibility, an add-in module can implement additional functions outside of the CSSM-defined API calls. CSSM defines a single pass-through function, which an add-in module can overload with multiple custom functions. The meaning and use of these functions is documented outside of CSSM by the module vendor.

Major benefits of having an Common Security Serivices

  • Lower costs in many areas.
  • More time to focus on your business.
  • Access to unique expertise and tools.
  • Direct cyber security.
  • Automatic detection and fixing of vulnerabilities.
  • Increased action-oriented insight and reduced alert fatigue.
  • Scalability.

Although technology such as surveillance cameras and alarms aid their work, it is still very involving and the Common security system has several disadvantages.

  • Risk. Security officers place their life on the line every time they go to work. ...
  • Low Pay. ...
  • Difficult Work. ...
  • Continuous Training.

Related Solutions

In this problem we will compare the security services that are provided by digital signatures (DS)...
In this problem we will compare the security services that are provided by digital signatures (DS) and hashed message authentication codes (HMAC). Alice and Bob are communicating over the Internet. We assume that Oscar Hacker is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any key but only knows the public keys used for the DS. State whether and how (a) DS and (b) HMAC protect against each attack. Suppose...
Issued $26,000 of common stock for cash. Provided $95,600 of services on account. Provided $52,000 of...
Issued $26,000 of common stock for cash. Provided $95,600 of services on account. Provided $52,000 of services and received cash. Collected $85,000 cash from accounts receivable. Paid $54,000 of salaries expense for the year. Adjusted the accounting records to reflect uncollectible accounts expense for the year. Leach estimates that 4 percent of the ending accounts receivable balance will be uncollectible. Closed the revenue account. Closed the expense account. Year 2: Wrote off an uncollectible account for $750. Provided $104,000 of...
GTA Landscaping's business is to offer several services to customers. Services include "Lawn Cutting", "Garden Planting",...
GTA Landscaping's business is to offer several services to customers. Services include "Lawn Cutting", "Garden Planting", fall "Leaf Clearing", and winter "Snow Shoveling". Each customer may require one or more of these services at a time; and the customer may require the same service repeated several times each year. GTA Landscaping: User View 1 Below are shown sample invoices for the services our business sells. (An invoice is the same as a receipt). We write a customer invoice once all...
A brief description of three core business services provided by bank and security and privacy needs...
A brief description of three core business services provided by bank and security and privacy needs in relation to the bank’s core business services.
list the factors that make the empty- nest syndrome less common today than it was several...
list the factors that make the empty- nest syndrome less common today than it was several decades ago. Also, discuss the issues facing adults wishing to go back to school.
Kevin provided services to several clients this year who paid with different types of property. Which...
Kevin provided services to several clients this year who paid with different types of property. Which of the following payments is not included in Kevin's gross income? Multiple Choice Cash. Shares of stock listed on the New York Stock Exchange. A used car. Gold coins. All of these are included in gross income.
Recently, several states have outsourced some of the services traditionally provided by government employees. In one...
Recently, several states have outsourced some of the services traditionally provided by government employees. In one state, the Department of Health and Human Services (Department) is close to finalizing an agreement to outsource its electronic benefit transfer services to eFunds Inc. Under the contract, eFunds Inc. will be responsible for the electronic distribution of food stamp programs, including transaction processing, reporting, contract management, contract settlement, operations support, help desk services, and project management. For cost reasons, eFunds Inc. will send...
Web Wizard, Inc., has provided information technology services for several years. For the first two months...
Web Wizard, Inc., has provided information technology services for several years. For the first two months of the current year, the company has used the percentage of credit sales method to estimate bad debts. At the end of the first quarter, the company switched to the aging of accounts receivable method. The company entered into the following partial list of transactions during the first quarter. During January, the company provided services for $41,000 on credit. On January 31, the company...
Execusmart Consultants has provided business consulting services for several years. The company has been using the...
Execusmart Consultants has provided business consulting services for several years. The company has been using the percentage of credit sales method to estimate bad debts but switched at the end of the first quarter this year to the aging of accounts receivable method. The company entered into the following partial list of transactions. During January, the company provided services for $300,000 on credit. On January 31, the company estimated bad debts using 1 percent of credit sales. On February 4,...
Web Wizard, Inc., has provided information technology services for several years. For the first two months...
Web Wizard, Inc., has provided information technology services for several years. For the first two months of the current year, the company has used the percentage of credit sales method to estimate bad debts. At the end of the first quarter, the company switched to the aging of accounts receivable method. The company entered into the following partial list of transactions during the first quarter. During January, the company provided services for $41,000 on credit. On January 31, the company...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT