Tuesday, October 22, 2019

Various Security Examples Example

Various Security Examples Example Various Security Examples – Coursework Example Telecommunications based on intrusion, firewalls, routers protection or detection systems. Examples of these networking models are the Open Systems Interconnect and the Transmission Control Protocol models (Lambo, 2006). The Transmission Control Protocol entails a core internet protocol which ensures reliable delivery mechanisms through the internet. Application security entails the approaches utilized in the code’s life cycle in order to prevent security gaps in security policy of applications, and the underlying system, through errors in design, development, upgrade, maintenance and deployment of the application. Application controls mind of the resources given to them. Therefore, they determine the utilization of the resources by application’s users through application security. Web Application Security Consortium and Open Web Application Security Project; provide updates concerning the latest threat which negatively affects the web based applications. This guides t he developers, security architects and testers; in focusing on mitigation strategy and superior design (Allen, 2001). Operations security ensures security of information assets found in the computer or directly related to the computing environment. Operations security is seen as the heart of the information security. This is because it controls the approaches of controlling and processing data (Dhillon, 2007). Information security programs which are complete must have adequate controls designed to ensure adequate levels of security. Hardware control, resource protection and privileged entity controls are significant aspects of operations controls. The operations control must provide consistency throughout the entire processes and applications. References Allen, H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley.Dhillon, G. (2007). Principles of Information Systems Security: text and cases. NY: John Wiley & Sons.Lambo, T. (November, 2006) , "ISO/IEC 27001: The future of infosec certification", ISSA Journal.William, S. (2007). Network security essentials: applications and standards. London: Prentice Hall.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.