Question

In: Computer Science

Compare and contrast security functional requirements and functional securiydesign principles.

Compare and contrast security functional requirements and functional securiydesign principles.

Solutions

Expert Solution

Security functional requirements

A functional requirements defines a function of a system or its component. A function is described as a set of inputs the behavior and outputs. Functional requirements may be calculations technical details data manipulation processing and other specific functionality that defines what is system is supposed to accomplish. Behavior of requirements describing all the cases where the system uses the functional requirements are captured in the use cases.

A security functional requirements describes functional behavior which can apply on security. Requirements can access control, data integrity,authentication etc. These all are in the functional requirements of a security functional requirements. Common Criteria for Information Technology mainly uses this Security functional requirements. It is used because when a product provides a security function then it specifies the individual security.

Security-related goals:

For an example one user's bank account balance should not be learned by or modified by another user, unless authorized.

Required mechanism for enforcing them:

For an example users can identify themselves only by putting the password which they have provided. Whatever password given by them may be that is strong or weak. And the password database storing the password must not be accessable to any program other than authenticating login program.

Typical kinds of security requirements:

1. Confidentiality:: Here sensitive information not leaked to unauthorized party or third party when the user wants to send something to another it should be bounded between them only.

2. Integrity:: Here sensitive information not damaged by unauthorized parties Violation of integrity can be direct or indirect.

3. Availability:: Here system is responsive to request.Dos(Denial of service ) attacks attempt to compromise availability.

Supporting mechanism:

1. Authentication:: The goal of this is to determine the subject of a particular security policy. In particular many policies needed to define a notion of identity.

2. Authorization:; It defines when a principal may perform an action.

3. Audit:: Here we need to retain enough information to be able to determine the circumstances of a branch or misbehavior.

functional security design principles:

There are different types of design principles of security.

1. Principles of least privileges:: Privilege means rights. The first principle states that how the privileges are to be granted to a subject means the subject should be given only those rights of privilege that require for completing a task means you have to give those rights which are require to complete a task of a subject.

for example if a subject requires append rights to an object then it must be given only the append rights not the write rights.

2.Principles of fail state defaults:: This principle states that unless the subject is given explicitly access to the object it should be denied access to that object. This means the default access to object is none.

3. Principle of economy of mechanism:: This principle states that security mechanism should be as simple as possible.If the design is simple there are few errors. And also checking and testing procedures also become easier.

4. Principle of open design:: This suggests that complexity doesn't add security. Also state that security of mechanism should not depend on the secrecy of its design.


Related Solutions

compare and contrast two fundamental security design principles. Analyze how these principles and how they impact...
compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.
compare and contrast a purely secular and the biblical approach to principles of management
compare and contrast a purely secular and the biblical approach to principles of management
Briefly compare and contrast Katz ADLS Functional Assessment tool with Lawton IADL Functional Assessment tool. See...
Briefly compare and contrast Katz ADLS Functional Assessment tool with Lawton IADL Functional Assessment tool. See your text for these tools. Chapter 31 What role does a functional assessment tool have in planning for care of an individual? Why would one use one and not the other? Refer to JARVIS chapter 31
Compare and contrast cyber security policy of Victorian and NSW governments
Compare and contrast cyber security policy of Victorian and NSW governments
Compare and contrast Functional and Dysfunctional communication patterns and further elaborate on the disturbed communications.
Compare and contrast Functional and Dysfunctional communication patterns and further elaborate on the disturbed communications.
 Describe the relationship between functional groups and macromolecules.  Compare and contrast different types of...
 Describe the relationship between functional groups and macromolecules.  Compare and contrast different types of isomeric compounds.  List the different kinds of biological macromolecules.  What is the special type of reaction that they all have in common to put them together? What about to breaks them apart?  Understand the relationship between amino acid sequence and their three-dimensional structure.  Know what makes the 20 different amino acids. Know the general structure of an amino acid.
Compare and contrast the structural and functional differences between the parasympathetic and the sympathetic nervous systems....
Compare and contrast the structural and functional differences between the parasympathetic and the sympathetic nervous systems. Identify an organ that is innervated by both systems and explain the effect of each system on the organ ?
compare and contrast the NYSE with the NASDAQ. What are the listing requirements for both markets?...
compare and contrast the NYSE with the NASDAQ. What are the listing requirements for both markets? Typically, what types of companies would you find listed on each market?
Q:Make a requirements document highlighting all functional and non-functional requirements as per the case above. Your...
Q:Make a requirements document highlighting all functional and non-functional requirements as per the case above. Your requirements must be validated for conciseness, completeness, non-ambiguity, verifiability, feasibility, and traceability: Register for the system by providing their name, Student ID and email address and a password Log in to the system by entering their Student ID and password Search for textbooks (by title or ISBN number or author) and scroll through the results of their search. The results of their search should...
Compare and contrast the main principles of classical conditioning and operant conditioning. How is the Behaviorist...
Compare and contrast the main principles of classical conditioning and operant conditioning. How is the Behaviorist Approach unique compared to other perspectives?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT