All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Five Security Design Principles, Research Paper Example

Pages: 3

Words: 894

Research Paper

The Principle of Clear Abstractions

In computer systems, the principle is applicable in a network structure. The principle demands that the computer network system should be well defined as well as simple. The network definition should incorporate the functionality of each of the network interfaces offering a clear structure of data manipulations and its management. The provision of the functionality of each of the interfaces of the system helps in critical analysis of the entire system. The critical analysis helps in the implementation of the different techniques for the principle of clear abstractions.

At EM’s Bakery, redundant avoidance will be implemented. Moreover, the principle will ensure that any unused interfaces are blocked. EM’s Bakery computer network involves multiple remote sites and availability of unused interfaces open to the public would be a critical security breach. It is pertinent to note that EM’s Bakery system structure will adopt an information hiding approach. The unfussiness of the structure is also a pertinent attribute of the system. EM’s Bakery system will have a single entry and exit points for users. This will limit accessibility and ensure there are no trouble spots characterized by recursion.

The Principle of Least Common Mechanism

The principle demands that if a computer system has multiple elements, a similar mechanism or a function the mechanism should be redesigned into a single module that is an accessible to all the elements. This eliminates any redundant implementation. EM’s Bakery computer network operating system resource managers for the multiple workstations will be shared. The complexity of the network will be eliminated across the multiple locations of EM’s Bakery network. This principle is also helpful in increasing the maintainability of the system since shared resources and single implementation to perform multiple functions is adopted. Common mechanisms are easy to maintain than distributed mechanisms. The implementation of common mechanisms at EM’s Bakery will be in such a manner that limits retention of information once the function request by a workstation is complete. This will help to reduce complexity. Another key aspect of the system will be the ability to maintain actively linked states that allow all the workstation to access active state information after verification (Saltzer, & Kaashoek, 2009).

The Principle of Efficiently Mediated Access

This other key will be applicable at EM’s Bakery to enhance the security of the network design. In order to implement a secure network, a process of access mediation is paramount. This principle demands that there is a stringent control on the network resource accessibility. At EM’s Bakery, a UNIX file descriptor will be implemented to ensure that all file accesses are authorized. Moreover, restrictive techniques for caching will be implemented. It is pertinent to note that this principle is associated with performance issues. Some of the performance issues that are associated with the principle of efficiently mediated access include system bottlenecks. However, the EM’s bakery system is implemented in a structural and robust manner (Held, 2000).

The Principle of Trusted Components

This principle aims at enhancing the integrity of information flowing across the computer network of EM’s bakery. The principle demands that the trustworthiness of a network element should be direct related to the level of security dependencies it provides to other network resources. EM’s Bakery head office resources will have the highest level of trustworthiness. Any access to the head office resources network will be through a high security firewall. Moreover, the components within the network should be structured in a manner that does not encourage the diminishing of the level of trust across the network. Trust dependencies within EM’s Bakery computer network are hierarchical in nature. A metric is necessary to determine the level of trustworthiness of the information being acted upon by the system. This is where a partial ordering approach is implemented with multiple layers of the system having different trust levels. Different manifestations of the trust nodes will be executed in order to make certain that an equivalence class of trustworthiness across the network. It is pertinent to note that a circular dependency approach will help in ensuring information received from the remote workstations as well as that those from the head office is secure (Kohno, Ferguson, & Schneier, 2010).

The Principle of Least Privilege

The principle demands that each element of a network should only be offered just adequate privileges to perform its function. At EM’s bakery, all the remote network resources such as workstation will be accorded privileges for network access that allows them to input information into the organizational databases. The principle is instrumental in minimizing the scope of application of a component in the network. This is helpful in enhancing accountability in the network since the system analysis will simplified with a component only performing a few tasks. This is an extraordinarily fundamental principle when it comes to system performance. Every interface in the network will have defined functions that are allowed to perform. The functionality of all components will act as the guiding elements in the establishment of privilege structure of the organization’s network (Swaminatha, & Elden, 2003)

References

Held, G. (2000). Network Design: Principles and Applications. Boca Raton: Auerbach.

Kohno, T., Ferguson, N., & Schneier, B. (2010). Cryptography Engineering: Design Principles and Practical Applications. Indianapolis, IN: Wiley Pub., Inc.

Saltzer, J. H., & Kaashoek, F. (2009). Principles of Computer System Design an Introduction. Burlington, MA: Morgan Kaufmann.

Swaminatha, T. M., & Elden, C. R. (2003). Wireless Security and Privacy: Best Practices and Design Techniques. Boston: Addison-Wesley.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper