Ite 530

Submitted by: Submitted by

Views: 373

Words: 570

Pages: 3

Category: Business and Industry

Date Submitted: 03/06/2014 04:14 PM

Report This Essay

1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?

Computer security took different path after the Department of Defense sponsored a draft research paper. This one page paper suggested that there are other threats my face information system; threats that will go beyond Computer physical location and hardware. The paper divided the threats into three categories which are:

1. Data management and policy issues.

2. Expanding security systems by including data and limiting unauthorized access.

3. Involving personal from different levels in information security issues.

This paper moved to different areas that were never examined before and addressed some issues that will be presented in near future especially with the expanding of the networking capabilities and more computers getting connected to it every day; which in tern create more threats. It provided developers and network engineers with new ideas of how will be possible to create defense mechanism against such attacks.

2. Assume that a security model is needed for protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components represented in that cell.

Applying a security model to the class information will require examining the assets and considering possible protection policy and access level. Considering the 27 possible security elements in McCumber Cube; we will need to consider the level of information confidentiality we need to apply to the class documents. We will also need to decide the integrity level of the data used through out the course. Finally put the access level and the info availability to professor, students, and staff.

3. Consider the information stored on your personal computer. For each of the terms listed, find an example...