Question

In: Computer Science

When working on secure a computer system a security design guide gives an essential guidance one...

When working on secure a computer system a security design guide gives an essential guidance one such example is the national security agency and the us department of Homeland security which lists the security design principles shown.

Solutions

Expert Solution

Security design principles are some principles for making a strong security mechanism for a system. Security  principles are develop to a secure system which prevent the national security flaws and unwanted access to the computer system server. There are some list of security design principles given below for the national security agency and the US department of homeland security are -;

  • Fail - safe defaults
  • open design
  • Least privilege
  • Psychological Acceptability
  • Encapsulation
  • Layering
  • Economy of Mechanism
  • Complete Mediation
  • Separation of privilege
  • Least Common Mechanism
  • Isolation
  • Modularity
  • Least astonishment

Related Solutions

How would you secure computer networks if you could design the Internet? What technologies would you...
How would you secure computer networks if you could design the Internet? What technologies would you deploy or develop to meet the need? CMGT/442
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure...
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure your data from hacking? 2-How often do you back up critical data files such as homework files? What type of device do you use for backing up files? Where do you store the backups to ensure they won’t be destroyed if a major disaster (such as a fire) destroys your computer? Do you use online sites for file backups?
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
Design a system with one input called “Up” such that when “Up” equals 1, the machine...
Design a system with one input called “Up” such that when “Up” equals 1, the machine counts 2, 3, 4, 5, 6, and repeat. If the “Up” input equals 0, the machine counts down 6, 5, 4, 3, 2, and repeat. Show the State Transition Diagram, State Transition table, K-maps, and equations assuming JK flip flops and AND/OR/NOT combinational logic. Make sure to indicate on your State Transition Diagram what happens if the system initially is in one of the...
Understanding the basis of infection is essential when working in a healthcare environment. Demonstrate your understanding...
Understanding the basis of infection is essential when working in a healthcare environment. Demonstrate your understanding of the following terminology (in 20-40 words each) Terminology a. Colonisation b. Infection c. Disease
why is it essential to have a good understanding to what dementia patients face when working...
why is it essential to have a good understanding to what dementia patients face when working as a nurse or medical staff member?
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function,...
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function, we would like to jump to the execve() function to execute "/bin/sh". Please describe how to do this. You are allowed to have zeros in your input (assume that memcpy() is used for memory copy, instead of strcpy())
Your company is working with Computer Security Inc. on a new system to process orders more quickly. Your manager has asked you to answer the following questing regarding the new system.
User Interface DesignYour company is working with Computer Security Inc. on a new system to process orders more quickly. Your manager has asked you to answer the following questing regarding the new system.What are some of the user-centered considerations in systems design and how can you use these to help design the user interface for Computer Security Inc.’s new order processing system?Suggest several types of controls such as command buttons, menu bars, check boxes, which might be used on a...
Show me a concept map on System Modeling and architectural design,illustrating the essential perspective of context,...
Show me a concept map on System Modeling and architectural design,illustrating the essential perspective of context, interaction, structure, and behavior modeling. Label each component
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT