Hire writer
Paper Types
Disciplines

Five Security Design Principles, Research Paper Example

Pages: 1

Words: 894

Research Paper

The Principle of Clear Abstractions

In computer systems, the principle is applicable in a network structure. The principle demands that the computer network system should be well defined as well as simple. The network definition should incorporate the functionality of each of the network interfaces offering a clear structure of data manipulations and its management. The provision of the functionality of each of the interfaces of the system helps in critical analysis of the entire system. The critical analysis helps in the implementation of the different techniques for the principle of clear abstractions.

At EM’s Bakery, redundant avoidance will be implemented. Moreover, the principle will ensure that any unused interfaces are blocked. EM’s Bakery computer network involves multiple remote sites and availability of unused interfaces open to the public would be a critical security breach. It is pertinent to note that EM’s Bakery system structure will adopt an information hiding approach. The unfussiness of the structure is also a pertinent attribute of the system. EM’s Bakery system will have a single entry and exit points for users. This will limit accessibility and ensure there are no trouble spots characterized by recursion.

The Principle of Least Common Mechanism

The principle demands that if a computer system has multiple elements, a similar mechanism or a function the mechanism should be redesigned into a single module that is an accessible to all the elements. This eliminates any redundant implementation. EM’s Bakery computer network operating system resource managers for the multiple workstations will be shared. The complexity of the network will be eliminated across the multiple locations of EM’s Bakery network. This principle is also helpful in increasing the maintainability of the system since shared resources and single implementation to perform multiple functions is adopted. Common mechanisms are easy to maintain than distributed mechanisms. The implementation of common mechanisms at EM’s Bakery will be in such a manner that limits retention of information once the function request by a workstation is complete. This will help to reduce complexity. Another key aspect of the system will be the ability to maintain actively linked states that allow all the workstation to access active state information after verification (Saltzer, & Kaashoek, 2009).

The Principle of Efficiently Mediated Access

This other key will be applicable at EM’s Bakery to enhance the security of the network design. In order to implement a secure network, a process of access mediation is paramount. This principle demands that there is a stringent control on the network resource accessibility. At EM’s Bakery, a UNIX file descriptor will be implemented to ensure that all file accesses are authorized. Moreover, restrictive techniques for caching will be implemented. It is pertinent to note that this principle is associated with performance issues. Some of the performance issues that are associated with the principle of efficiently mediated access include system bottlenecks. However, the EM’s bakery system is implemented in a structural and robust manner (Held, 2000).

The Principle of Trusted Components

This principle aims at enhancing the integrity of information flowing across the computer network of EM’s bakery. The principle demands that the trustworthiness of a network element should be direct related to the level of security dependencies it provides to other network resources. EM’s Bakery head office resources will have the highest level of trustworthiness. Any access to the head office resources network will be through a high security firewall. Moreover, the components within the network should be structured in a manner that does not encourage the diminishing of the level of trust across the network. Trust dependencies within EM’s Bakery computer network are hierarchical in nature. A metric is necessary to determine the level of trustworthiness of the information being acted upon by the system. This is where a partial ordering approach is implemented with multiple layers of the system having different trust levels. Different manifestations of the trust nodes will be executed in order to make certain that an equivalence class of trustworthiness across the network. It is pertinent to note that a circular dependency approach will help in ensuring information received from the remote workstations as well as that those from the head office is secure (Kohno, Ferguson, & Schneier, 2010).

The Principle of Least Privilege

The principle demands that each element of a network should only be offered just adequate privileges to perform its function. At EM’s bakery, all the remote network resources such as workstation will be accorded privileges for network access that allows them to input information into the organizational databases. The principle is instrumental in minimizing the scope of application of a component in the network. This is helpful in enhancing accountability in the network since the system analysis will simplified with a component only performing a few tasks. This is an extraordinarily fundamental principle when it comes to system performance. Every interface in the network will have defined functions that are allowed to perform. The functionality of all components will act as the guiding elements in the establishment of privilege structure of the organization’s network (Swaminatha, & Elden, 2003)

References

Held, G. (2000). Network Design: Principles and Applications. Boca Raton: Auerbach.

Kohno, T., Ferguson, N., & Schneier, B. (2010). Cryptography Engineering: Design Principles and Practical Applications. Indianapolis, IN: Wiley Pub., Inc.

Saltzer, J. H., & Kaashoek, F. (2009). Principles of Computer System Design an Introduction. Burlington, MA: Morgan Kaufmann.

Swaminatha, T. M., & Elden, C. R. (2003). Wireless Security and Privacy: Best Practices and Design Techniques. Boston: Addison-Wesley.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Williams Syndromes, Research Paper Example

Definition and Description of Disorder Williams Disorder is defined as a genetic abnormality that is defined by a number of genes that are missing, which [...]

Pages: 1

Words: 852

Research Paper

The Role of Physical Activity, Research Paper Example

What is the role of physical activity in the prevention of childhood obesity? This proposal addresses the role of physical activity as an intervention to [...]

Pages: 1

Words: 511

Research Paper

Trends and Challenges, Research Paper Example

Trends and Challenges in Human Resources Management “The competitive forces that managers face today and will continue to confront in the future demand organizational excellence. [...]

Pages: 1

Words: 545

Research Paper

Benefits of DDT in the Battle Against Malaria, Research Paper Example

Introduction Malaria is a parasitic, mosquito-borne disease that affects more than 300 million people annually. The disease causes chills, fever, and other flu-like symptoms, which, [...]

Pages: 1

Words: 1771

Research Paper

Health Care Beliefs in the Somalia Culture, Research Paper Example

Somalia has experienced significant turmoil in recent years as a result of sociological and political conditions.  In this country, residents often believe that healthcare is [...]

Pages: 1

Words: 1707

Research Paper

My Professional Development, Research Paper Example

Master of Science in Human Services: Personal Plan of Study Woodrow Wilson once stated that “There is no higher religion than human service. To work [...]

Pages: 1

Words: 848

Research Paper

Williams Syndromes, Research Paper Example

Definition and Description of Disorder Williams Disorder is defined as a genetic abnormality that is defined by a number of genes that are missing, which [...]

Pages: 1

Words: 852

Research Paper

The Role of Physical Activity, Research Paper Example

What is the role of physical activity in the prevention of childhood obesity? This proposal addresses the role of physical activity as an intervention to [...]

Pages: 1

Words: 511

Research Paper

Trends and Challenges, Research Paper Example

Trends and Challenges in Human Resources Management “The competitive forces that managers face today and will continue to confront in the future demand organizational excellence. [...]

Pages: 1

Words: 545

Research Paper

Benefits of DDT in the Battle Against Malaria, Research Paper Example

Introduction Malaria is a parasitic, mosquito-borne disease that affects more than 300 million people annually. The disease causes chills, fever, and other flu-like symptoms, which, [...]

Pages: 1

Words: 1771

Research Paper

Health Care Beliefs in the Somalia Culture, Research Paper Example

Somalia has experienced significant turmoil in recent years as a result of sociological and political conditions.  In this country, residents often believe that healthcare is [...]

Pages: 1

Words: 1707

Research Paper

My Professional Development, Research Paper Example

Master of Science in Human Services: Personal Plan of Study Woodrow Wilson once stated that “There is no higher religion than human service. To work [...]

Pages: 1

Words: 848

Research Paper