Monday, March 16, 2020

Appraisal Of Security Architecture Design Models Coursework

Appraisal Of Security Architecture Design Models Coursework Appraisal Of Security Architecture & Design Models – Coursework Example Appraising Security Architecture and Design models A security model illustrates the security policy. Security policy entails adocument that effectively describes protection mechanisms for computers. The security policy entails a security statement of expectations of the system. The security model explains the entities governed through the policy; and illustrates rules that form part of the policy (Jonathan, 2008). There are various examples of security models: First, models that illustrate policies for integrity (Clark-Wilson) and confidentiality (Bell-LaPadula). Second, models appling static policies (Bell-LaPadula) and dynamic policies (Chinese Wall); and third, models which are informal (Clark-Wilson) and formal (Bell-LaPadula). The Bell-LaPuda Confidentiality Model involves the initial mathematical model with a security policy which is multilevel. The model illustrates secure state machine, methods of access, and rules of access. The model ensures that users with appropriate clea rances (confidential, top secret, and secret) are adequately authenticated. The model operates on two major rules; the subject cannot access data found at higher levels of security, and a subject cannot pass information to lower levels of security (Zellan, 2003). The Clark-Wilson Integrity Model describes the integrity of given information. The model divides data into two: constrained data item that should be effectively protected and unconstrained data items that requires less protection (Zellan, 2003). The model prevents unauthorized individuals from further modification of the system. The separation of duties also limits authorized users from initiating improper modifications. The model has effective transactions; which ensure both internal and external consistency. The Chinese Wall Model ensures access controls which effectively changes, in accordance with the previous actions of the user. The main purpose of the Chinese Wall Model is to safeguard against user’s conflict of interests, during access attempts (Jonathan, 2008). No information is allowed to flow between the subjects and the objects, in a manner resulting to conflict of interest. The subject can only write on an object, only if the subject is unable to read another object in different sets of data. A security model is responsible for mapping policy’s abstract goals to the information system through specifying the explicit data structures that that are required to implement the security policy (Cashell et al, 2004). The security model is normally illustrated using analytical and mathematical concepts, which are mapped to the specifications of the systems, and developed through the programming code. ReferencesCashell, B. et al. (2004). The Economic Impact of Cyber-Attacks. Washington DC: The Library of Congress.Jonathan, Z. (2008). The Future of the Internet. NY: Penguin Books. Zellan, J. (2003). Aviation Security. Hauppauge, NY: Nova Science, pp. 65–70.