Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Five Security Design Principles, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
The Principle of Clear Abstractions
In computer systems, the principle is applicable in a network structure. The principle demands that the computer network system should be well defined as well as simple. The network definition should incorporate the functionality of each of the network interfaces offering a clear structure of data manipulations and its management. The provision of the functionality of each of the interfaces of the system helps in critical analysis of the entire system. The critical analysis helps in the implementation of the different techniques for the principle of clear abstractions.
At EM’s Bakery, redundant avoidance will be implemented. Moreover, the principle will ensure that any unused interfaces are blocked. EM’s Bakery computer network involves multiple remote sites and availability of unused interfaces open to the public would be a critical security breach. It is pertinent to note that EM’s Bakery system structure will adopt an information hiding approach. The unfussiness of the structure is also a pertinent attribute of the system. EM’s Bakery system will have a single entry and exit points for users. This will limit accessibility and ensure there are no trouble spots characterized by recursion.
The Principle of Least Common Mechanism
The principle demands that if a computer system has multiple elements, a similar mechanism or a function the mechanism should be redesigned into a single module that is an accessible to all the elements. This eliminates any redundant implementation. EM’s Bakery computer network operating system resource managers for the multiple workstations will be shared. The complexity of the network will be eliminated across the multiple locations of EM’s Bakery network. This principle is also helpful in increasing the maintainability of the system since shared resources and single implementation to perform multiple functions is adopted. Common mechanisms are easy to maintain than distributed mechanisms. The implementation of common mechanisms at EM’s Bakery will be in such a manner that limits retention of information once the function request by a workstation is complete. This will help to reduce complexity. Another key aspect of the system will be the ability to maintain actively linked states that allow all the workstation to access active state information after verification (Saltzer, & Kaashoek, 2009).
The Principle of Efficiently Mediated Access
This other key will be applicable at EM’s Bakery to enhance the security of the network design. In order to implement a secure network, a process of access mediation is paramount. This principle demands that there is a stringent control on the network resource accessibility. At EM’s Bakery, a UNIX file descriptor will be implemented to ensure that all file accesses are authorized. Moreover, restrictive techniques for caching will be implemented. It is pertinent to note that this principle is associated with performance issues. Some of the performance issues that are associated with the principle of efficiently mediated access include system bottlenecks. However, the EM’s bakery system is implemented in a structural and robust manner (Held, 2000).
The Principle of Trusted Components
This principle aims at enhancing the integrity of information flowing across the computer network of EM’s bakery. The principle demands that the trustworthiness of a network element should be direct related to the level of security dependencies it provides to other network resources. EM’s Bakery head office resources will have the highest level of trustworthiness. Any access to the head office resources network will be through a high security firewall. Moreover, the components within the network should be structured in a manner that does not encourage the diminishing of the level of trust across the network. Trust dependencies within EM’s Bakery computer network are hierarchical in nature. A metric is necessary to determine the level of trustworthiness of the information being acted upon by the system. This is where a partial ordering approach is implemented with multiple layers of the system having different trust levels. Different manifestations of the trust nodes will be executed in order to make certain that an equivalence class of trustworthiness across the network. It is pertinent to note that a circular dependency approach will help in ensuring information received from the remote workstations as well as that those from the head office is secure (Kohno, Ferguson, & Schneier, 2010).
The Principle of Least Privilege
The principle demands that each element of a network should only be offered just adequate privileges to perform its function. At EM’s bakery, all the remote network resources such as workstation will be accorded privileges for network access that allows them to input information into the organizational databases. The principle is instrumental in minimizing the scope of application of a component in the network. This is helpful in enhancing accountability in the network since the system analysis will simplified with a component only performing a few tasks. This is an extraordinarily fundamental principle when it comes to system performance. Every interface in the network will have defined functions that are allowed to perform. The functionality of all components will act as the guiding elements in the establishment of privilege structure of the organization’s network (Swaminatha, & Elden, 2003)
References
Held, G. (2000). Network Design: Principles and Applications. Boca Raton: Auerbach.
Kohno, T., Ferguson, N., & Schneier, B. (2010). Cryptography Engineering: Design Principles and Practical Applications. Indianapolis, IN: Wiley Pub., Inc.
Saltzer, J. H., & Kaashoek, F. (2009). Principles of Computer System Design an Introduction. Burlington, MA: Morgan Kaufmann.
Swaminatha, T. M., & Elden, C. R. (2003). Wireless Security and Privacy: Best Practices and Design Techniques. Boston: Addison-Wesley.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee