Wednesday, December 11, 2019

Management of Networks and Security Samples †MyAssignmenthelp.com

Questions: 1.Describe approaches to computer security? 2.Recognize some of the basic models used to implement security in operating systems? 3.Describe the physical security components that can protect your computers and networks? 4.Describe steps that organizations can take to improve their security? Answers: 1. Approach to computer security can be grouped into three broad categories. These are security correctness, isolation and obscurity. Security by correctness involves considering security measures as earl as from the design stage of the development. For instance, an effort is made to make the program have as few as possible bugs. Example is Microsofts Secure Development Life Cycle which is used to reduce the number of bugs in code during the development phase. The second one, security by isolation involves division of the systems components into individual parts bringing the focus on each smaller element. This approach is applied in the principle of least privilege. The third approach is security by obscurity. This comes in handy when correctness fail to remove all the bugs, which is inevitable. This simply involves randomization of elements in the code to make it difficult of attackers to specify a specific component to attack. The method is employed in Microsoft Vista which randomi zes the elements on the Kernel memory (Dowland and Furnell, 2012). 2. Some of the security models used include Bell-LaPadula Model, Biba Model, ClarkWilson Integrity Model and the HarrisonRuzzoUllman Model. In the Bell-LaPadula Model, components are grouped into some levels of classification. The classified components are then authorized to ensure that only the components at higher level can access the ones below them (Walker, 1985). The model has a shortcoming since it allows components in a lower class to write to those at a higher class making it possible to corrupt them. The second one, the Biba Model, focus on integrity rather than confidentiality as it was with the Bell-LaPadula model. This method simply preserves integrity of objects instead of their confidentiality (Walker, 1985). Another model is the Harrison Ruzzo Ullman Model. This model is allow access to an object in absence of the owner object. 3. The physical components to protect computers and networks can be in form of laid down policies that control the physical actions of individual that are allowed access to the computers as well as physical aspects that protect the network and the computers. For instance, setting policies that will regulate the number and the people that have access to the network room and the computers will limit unauthorized persons to breach the computer security. Similarly, setting up a network control room where the servers are kept away from the public and only accessed allowed to say, the network administrator is as well a physical security implementation. Looking such places with padlocks, setting up alarm systems and using biometric access to open control rooms and computers can be taken as physical security. Other physical aspects of physical security may include hiring full time guards to look after computers and network rooms. Coupled with identity pass codes of the persons authorized to access the control rooms, the guards will be able to determine who is supposed to access the computers and network rooms and who is not. 4. Organizations can improve their security against attack putting in place measures to prevent these attacks before they occur or curb the attacks as they occur. The following steps can help to an organization improve their security. Set up physical control rooms for their networks and hire guards to protect their computers. Through doing this, the organization will make sure that the people who can access the control rooms are authorized and ensure their computers are protected. Organizations can also ensure their control rooms are protected and looked up when not in use. Setting up policies that control the usage of computers An organization should set up policies that define who can use the computers and what they can do with the computers. This way they will be able to prevent unauthorized people from using the computers as well as preventing authorized people from installing malware on their systems. Setting up network monitors and anti-malware software Using packet sniffers, organizations can be on the lookout of any network breaches just in time to prevent catastrophic loss of important data. Organizations can also use anti-malware on their computers to prevent possible attacks on their systems. References Dowland, P. and Furnell, S. (2012).Advances in communications, computing, networks and security. Plymouth [England]: Plymouth University, pp.220-230. Nces.ed.gov. (2017).Chapter 5-Protecting Your System: Physical Security, from Safeguarding Your Technology, NCES Publication 98-297 (National Center for Education Statistics). [online] Available at: https://nces.ed.gov/pubs98/safetech/chapter5.asp [Accessed 19 Jul. 2017]. Walker, S. (1985). Network Security Overview.1985 IEEE Symposium on Security and Privacy.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.