Sunday, June 9, 2019

Information Security Physical Security models Essay

Information guarantor Physical Security models - Essay ExampleIt achieves this by describing steps followed to achieve security goals of an institution. Security models are great tools in evaluating the security in place.Gregory (2010) outlines information various security models that have been developed such as the following The Bell-LaPadula model is ostensibly a notable achievement in computer security. Several other models followed suit, with either improvements on their predecessors or variations. The Harrison-Ruzzo-Ullman (HRU) is an example of a general model in comparison to the Bell-LaPadula model which captured confidentiality aspects of access control. There emerged other models such as Chinese Wall model, the Biba and Clark-Wilson models that were more integrity based as well as the Information flow and non-interference models that centered on perfection. All these models were developed to safeguard information and information systems from leakages, unauthorized access and rights violation. However, the above models are more parcel based rather than physical.Threats to physical security involve disruption of services, theft, malicious physical damage, unlawful leakage and loss of system reliability. In any case, however, same to general information security, physical security calls for a layered defense model. A layered security model will emanate from the perimeter and nada in on the asset in this case, information. Layered security models will serve to achieve deterrence, delaying, detection, assessment and response in a bid to gratify the security objective. A physical security model must, therefore, be able to address the above threats efficiently and comprehensively. According to the US Army Field manual 3-19.30 (2001, January 8) physical security is that part of physical measures designed to ensure the safety of personnel to thwart unlawful access to equipment, the installations

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.