Monday, February 17, 2020
Computer Sciences and Information Technology Essay - 5
Computer Sciences and Information Technology - Essay Example The recent years have been marked by a shift of resources to more secure designs now that the implementation bags have proved to be scarce courtesy of SDL (Viega and McGraw, 2002, p. 67) Threat models are SDLââ¬â¢s cornerstone as they make it possible for the development team to figure out secure designs in a way that is structured. To achieve this effectively, threat model has been simplified into several tasks; coming up with pictures of data flows software, the application of the ââ¬Å"stride per elementâ⬠method in an effort to identify threats applicable to the desired design, taking a look at each threat and verification to ensure that the software has been modeled enough by putting into consideration each threat and addressing all the discovered threats (Pfleeger, 1997, p. 78) The basic element of a threat model is in its delineation of the entry points in its application. The threat model is in such a way that it is able to capture the entry points in form of trust b oundaries during the phase commonly referred to as the ââ¬Å"picture-drawingâ⬠. Good examples of this include; registry and files entry points and networking entry points. A threat model that is good enough should also be in a position to capture the authorization as well as the authentication requirements and the network accessibility of the interfaces. This process involves network accessibility via the IP address including the remote and local, local-only access and local subnet. The process also includes the authorization and authentication levels, user access, administrator-only access and anonymous access. When it comes to Windows access control lists (ACLs), the authorization levels come as finer-grained (Pfleeger, 1997, p. 56). The process identity is another critical data piece that is always captured by this model. In this case, the running codeââ¬â¢s interference is what is taken to be the entry point and the resulting process which is high-privilege is considere d to be very dangerous if it is compromised. In the case of Windows, the administrator or the system process are regarded as being the highest privilege. In Mac OS X or Linux situation, the running process happens to be the most privileged (Viega and McGraw, 2002, p. 108). References List Pfleeger, C. 1997. Security in Computing. Prentice Hall: New Jersey Viega, J & McGraw, G. 2002. Building Secure Software. Addison-Wesley: New York DQ: RBAC The Role-Based Access Control (RBAC) is an essential access management approach. It offers a provision method that is straight forward and in the right access level and to the correct users every time it is being applied. Despite RBAC applications, most of the security teams are still facing difficulties when it comes to account implementation and the process of access management on RBAC. The reason for the above scenario is that most of the internal developerââ¬â¢s teams and vendors are not coming up with capabilities based on the expected r ole into the solutions at hand. RBAC has been applicable in major overhaul in the last two years resulting to its application being assigned to more than 20, 000 users on each product. Many vendors tend to be attracted to such products. This indicates how RBAC has value to the management and its users. The latest RBAC model is designed in such a way that it enforces the least segregation and
Monday, February 3, 2020
Transformational Leader Case Study Example | Topics and Well Written Essays - 1250 words
Transformational Leader - Case Study Example Gandhi respected the Hindu religion that he observed through out his life. His values and principles had basis on religion and the understanding of basic human rights, gained from his career in law. To Indians, Gandhi is the founding father of their nation. Gandhi lived according to his philosophy of creating harmony of thought, speech, and action (Allen, 2008). His philosophies are still worthwhile and applicable today. Mohandas was the last-born son of karamchand, from his fourth wife. Mohandas got into marriage at an early age, marrying his age mate. Theirs was an arranged marriage reflecting the Indian culture instilled in Gandhi. In his childhood, there was nothing peculiar, Gandhi lived to respect his parents and was an ordinary student in school (Jegen and Deats, 2005). In 1888, Gandhi left India for London, to further his studies. He spent three of his years studying law in London. Gandhi spent the first three months of his life trying to accustom himself to fit in the English culture but gave after he realized that he could handle a simple life better. He gave up on the English sophistication. He settled down to concentrate on his studies and obtained his degree in law. Gandhi travelled back to India after his studies to rejoin his wife and kids. Gandhi returned to India only to face disappointment because he could not get a job. Fortunately, an opportunity opened up in South Africa. He set out to South Africa, and his stay there transformed the soft-spoken Gandhi to a more assertive individual. In his first formal trip, he faced discrimination for being Indian. South Africa was under the British rule and the colonialists discriminated all other races. Gandhi chose to fight for the rights of Indians in South Africa. Therefore, he extended his stay in South Africa. The oppressing system did not allow Indians to vote and Gandhi wrote petitions concerning this issue. However, Gandhi was a man of his own kind in philosophy and he decided to fight
Subscribe to:
Posts (Atom)