Examples of why trust is important in computer security

Assignment Help Computer Network Security
Reference no: EM133394258

Assignment:

1. Articulate the principle of least privilege and why it's important to reduce privileges.

2. Describe how to design a system to limit the damage of a compromise.

3. Provide examples of why trust is important in computer security.

Privilege separation ensures that a program is divided into parts and limits the specific privileges they require in order to perform a particular task.Ensuring privileges are separated and limited is an essential tenet of prudent cybersecurity hygiene. Taking a concerted approach to authenticating users and limiting respective privileges helps to manage and reduce risk in a sustainable and enduring manner. A proactive and policy-based approach limits potential abuse and mitigates risk.

For your post, apply this concept to your work or home environment. Consider the following and discuss your approach:

1. What model is currently in place now?

a. Within the context of your system, are there any controls in place to limit access to data or monitor for impropriety?

b. Are any safeguards in place to ensure programs, applications or system calls do not access unwanted areas?

  • Are there any programs or system processes that come to your mind that you would want to segment or limit access to/from?
  • Within the context of your home or work network, how are different levels of access and privileges assigned or administered?

c. Are there system, network, or domain administrators?

d. How are privileges currently divided out to users?

e. Are there any relevant policies or procedures limiting privileges or ensuring proper separations across users?

f. What steps can you take, or would you propose, in order to advance these principles (e.g., principle of least privilege, separation of privileges)?

  • How can you apply privilege separation within your environment to limit compromise?
  • How would you propose institutionalizing these changes?

Reference no: EM133394258

Questions Cloud

How is igam concept applied in health care organizations : How common is the IGAM concept applied in health care organizations in the United States.
Explain the breaking an encryption algorithm : Difference between breaking an encryption algorithm, deriving an encryption key, and determining the plaintext that corresponds to a given piece of ciphertext.
Describe the security risks : Describe the security risks and rewards associated with implementation of proper security policies and procedures.
When did organization implement its server virtualization : What is an example of an organization that utilizes virtualization for its cloud computing solution?
Examples of why trust is important in computer security : Describe how to design a system to limit the damage of a compromise. Provide examples of why trust is important in computer security.
Discuss developments in cryptography : Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber perspective.
What is mobile security : What is mobile security and the connection between cloud and mobile security?
Develop a learning outcome that will help you improve : Learning Outcome/Goal Now that you have completed your reflection on your health and identified one aspect of it that you would like to improve OR would like
How does kerberos prevent against capture : How does Kerberos prevent against capture and replay and man-in-the-middle attacks? Explain what it is about Kerberos that makes a tool like Kerbcrack work.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  Assignment on cybersquatting

Discuss your reaction to this issue and the implications this issue causes. Can you see the pros and cons of this from the business point of view versus the personal point of view? Discuss your thoughts.

  Cybersecurity challenges in cyberspace

How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

  Wat issues need to be considered when planning an

common data formats are critical to being able to exchange data quickly and smoothly. establishing the standards for

  Write about computer security affects you at school

Write about computer security affects YOU at school and in your personal life. You may be surprised at how many things you do that depend on some aspects of secure computer records and communications, like banking, grades, e-mail, timesheets, libr..

  Calculate tom utility-maximizing purchases of x and y

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.

  Functions of the transport and network layers

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space? How has/will IPv6 impact organizations, the Internet, and you at home?

  What are three major aspects of intrusion prevention

There are many components in a typical security policy. Describe three important components. What are three major aspects of intrusion prevention?

  Private and public cloud storage and security concerns

You need to do the literature review on private and public cloud storage and Security concerns - Review the given document and minimize the similarity.

  List network security measures to be implemented

List network security measures to be implemented. Justify the need for the network services, security measures, and devices you've selected.

  Principles of user experience design

CETM44 Cybersecurity and User Experience Design, University of Sunderland - A critical appreciation of the principles of user experience design

  Discuss the major challenges in continuous monitoring

Let's evaluate some technologies that can help with continuous monitoring. One example is Cyberscope which is an automated reporting tool for security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd