Approaches to Computer Security

Approaches to Computer Security
Approaches to Computer Security
a) Security Design: There are several ways through, which security systems are designed. It is paramount to mount effective security strategies that can ensure adequate safety for computing systems. One of such ways is to initiate the principle of least priviledge that “where an entity has only the priviledges that are needed for its functions” (://en.wikipedia.org/wiki/Computer_security). In this case, if an intruder gains access (illegally) into a part of the system, it will be difficult for him/her to access the whole system due to the fine-grained security.
It is therefore advisable to mount a security design that breaks the system into several smaller units with each of the units designed in a less complicated way, and may involve the application of automated theorem proving to verify the exactness of key software subsystems. In a situation where formal correctness is missing, careful application of code review and unit testing will be a best-effort approach in securing the modules. Enough efforts should also be made to discourage or eliminate security breaches by the system users, and it is therefore, important to create full audit trails that will assist us in detecting and determining the nature of breach, its degree and the time it occurs. Audit trials should be stored very discreetely in such a way that it will be difficult for the intruder to track it to cover up every trace of the illegal entry;
b) Security Architecture: Security Architecture is also a very viable approach to computer and information security. It simply means the design artifacts that explain the state of existing security controls or security countermeasures, showing how they relay with the general information technology architecture. The security controls basically focus on providing platform to enhance the capacity of the system to sustain quality attributes including confidentiality, integrity, availability, accountability and assurance (see Error! Hyperlink reference not valid.). Security Architecture assists us to identify the areas that demand much security measure, and thus, “if the plan describes a specific solution then, prior to building such a plan, one would make a risk analysis”, but in a situation where “the plan describes a generic high level design (reference architecture) then the plan should be based on a threat analysis” (Error! Hyperlink reference not valid.); and
c) Secure Hardware: Computer security can be enhanced through hardware-based security because of the capacity of hardware-based security solutions to present
CSS 241 BASIC SECURITY AND SECURITY THREATS
38
strong resistance against bugs and intrusion. It can deny any intruder or hacker the avenue to read and write access to data.

Comments

Popular posts from this blog

Church Of England Reverend Caught Sniffing Cocaine & Watching Porn (Photos)

Lyrics I Miss You Clean Bandit, Julia Michaels

Expect More Increase In Electricity Bill – NERC (watch out)