.

Thursday, April 18, 2019

Information Security Physical Security models Essay

information Security Physical Security moldings - Essay ExampleIt achieves this by describing steps followed to achieve guarantor goals of an institution. Security models are great tools in evaluating the protection in place.Gregory (2010) outlines breeding various security models that have been developed such as the following The Bell-LaPadula model is evidently a notable achievement in computer security. Several other models followed suit, with either improvements on their predecessors or variations. The Harrison-Ruzzo-Ullman (HRU) is an slip of a usual model in comparison to the Bell-LaPadula model which captured confidentiality aspects of rag control. There emerged other models such as Chinese Wall model, the Biba and Clark-Wilson models that were more integrity based as well as the Information flow and non-interference models that centered on perfection. All these models were developed to safeguard information and information systems from leakages, unauthorized access an d rights violation. However, the above models are more software based rather than physical.Threats to physical security involve spread of services, theft, malicious physical damage, unlawful leakage and loss of system reliability. In any case, however, similar to general information security, physical security calls for a layered defense model. A layered security model will emanate from the perimeter and zero in on the asset in this case, information. Layered security models will serve to achieve deterrence, delaying, detection, assessment and response in a bid to fulfill the security objective. A physical security model must, therefore, be able to address the above threats efficiently and comprehensively. agree to the US Army Field Manual 3-19.30 (2001, January 8) physical security is that part of physical measures designed to consider the safety of personnel to thwart unlawful access to equipment, the installations

No comments:

Post a Comment