Question

An important concept in the design and analysis of secure systems is the security model because...

An important concept in the design and analysis of secure systems is the security model because it incorporates the security policy that should be enforced in the system. Here is a question to start off the discussions: Which model deals only with confidentiality and what are its significant tenets?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

Parkerian hexad is one such model which deals with confidentiality and also has the possession or the control, also has the integrity, authenticity, availability as well as utility. This also ensures the 3 CIA triad for protecting the design of the security system.

Some of the significant tenets are as follows:

This encompasses the principles of the CIA. It also has possession and control.

It has the physical security and authenticity controls, and it also has the principle of access control.

If you like the answer, do hit like.
Hope this answer helps.
Thanks

Add a comment
Know the answer?
Add Answer to:
An important concept in the design and analysis of secure systems is the security model because...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The CIA model of information security is a very fundamental concept in security. Ensuring the three...

    The CIA model of information security is a very fundamental concept in security. Ensuring the three sides of the CIA model is protected is an important step in designing a secure system. Do you feel the CIA model provides enough security for today’s systems? Why or why not? Provide an example that supports your belief.

  • Book: Systems Analysis & Design, 5th Edition Chapter 1 Question: Technology is no panacea. Companies that...

    Book: Systems Analysis & Design, 5th Edition Chapter 1 Question: Technology is no panacea. Companies that adopt technology are also met with IT failures. Knowledge of the role that Systems Analyst play is essential; therefore, why is it necessary that Managers and Analyst work collaboratively to solve IT problems? Answer the following 3 (at least 5 lines) Claim (not a FACT). Here is what I believe: Data (start with the word BECAUSE). Here is why I believe it: Rebuttal (start...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Question 1 An edge controller is necessary in IoT because:    Security    Real-time response   ...

    Question 1 An edge controller is necessary in IoT because:    Security    Real-time response    Resiliency    Conserving bandwidth    All of the above Question 2 The cloud is attractive in IoT because:    Availability of computational resources    Security    A good design metaphor    All of the above Question 3 RFID took off in:    Groceries    Trucking    Clothing    Air transport Question 4 Passive RFID tags:    Draw power from a battery    Absorb energy...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • CSCI 359 Systems Analysis and Design Written Assignment #1 Answer each of the following questions for...

    CSCI 359 Systems Analysis and Design Written Assignment #1 Answer each of the following questions for 2 points. Submit all your answers in one file. Question 1: Propose a new meaningful project: give a name, definition and describe its scope as in a scope document (Your project proposals will be circulated in the class for creating new projects and forming project teams by the instructor). Question 2: What are the five phases of the SDLC? Question 3: What is the...

  • Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security...

    Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security is not just device security. True False Question 2 1 point possible (graded) When comparing IoT malware to traditional viruses, worms, or spam, which of these statements are true? (Select three) Conventional anti-virus or anti-spam schemes work well for IoT malware detection and prevention. IoT malware has much less user interaction. IoT malware is hard to kill due to lack of direct interface with...

  • Ethics Challenge Ch3p133 Terri Ronsin had recently been transferred to the Home Security Systems Division of...

    Ethics Challenge Ch3p133 Terri Ronsin had recently been transferred to the Home Security Systems Division of National Home Products. Shortly after taking over her new position as divisional controller, she was asked to develop the division's predetermined overhead rate for the upcoming year. The accuracy of the rate is important because it is used throughout the year and any overapplied or underapplied overhead is closed out to Cost of Goods Sold at the end of the year. National Home Products...

  • Problem 52: (25 points) Operational amplifiers are important building blocks in a wide spectrum of electronic systems such as amplifiers and filters. The concept of feedback control is of central imp...

    Problem 52: (25 points) Operational amplifiers are important building blocks in a wide spectrum of electronic systems such as amplifiers and filters. The concept of feedback control is of central importance in understanding the design of operational amplifier circuits. For without feedback, operational amplifiers behave as comparators. This problem shows why it is necessary to connect the output of an operational amplifier to its inverting input. Negative feedback produces a circuit that is BIBO stable. Figure 1(A) shows the circuit...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT