Reference no: EM132908665
Question: Reply to the discussion Below: Domain Seperation COLLAPSE The first principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity.
Since not all systems are designed in the same way there is no one cybersecurity methodology but rather core qualities that help promote it. There are 10 first cybersecurity principles identified by the National Security Agency (NSA). The 10 principles are (1) domain separation, (2) process isolation, (3) resource encapsulation, (4) least privilege, (5) layering, (6) abstraction, (7) information hiding, (8) modularity, (9) simplicity, (10) minimization. For the purpose of the discussion board domain separation will the principle of emphasis.
Domain separation is concept of separating data, processes, and administrative tasks into logically defined domains (Servicenow 2020). Domains in a computer are collection of data or instructions.
For example, most computers have two domains. A supervisory domain that runs the OS and the user domain. The supervisory domain gives direct access to the RAM and also be able to manipulate certain aspects of the operating system.
The domains outside a computer can be an area of responsibility. For example, an application like Netflix will have individual domains for their customers so that they are able to watch their shows and customize their suggestion on a individual basis. This domain would separate to that of different customers. There would also be administrative domains where Netflix could dictate rules, block access to individual and also make sure the overall system is working.
With the understanding of what domains are it is helpful to see define domain separation in layman's terms. Domain separation something like securing an apartment building. Each apartment has different tenants with various items they would like to protect. They secure these items by locking the door to their apartment so that no one else may enter it effectively securing it. Though on occasion a there maybe be able to break into an apartment it is very rare that they would be able to break into all the apartments within the building since each of those apartments are individually locked with different keys. This is essential the same concept with domain separation with applications. This is useful for businesses who wish to separate data into individual categories so they can protect it as well as organize it. Reference Servicenow. (2020, July 23).
What is the maximum initial cost the company
: Och, Inc., is considering a project that will result in initial after tax cash savings of $1.72 million. What is the maximum initial cost the company
|
What is the value of the sample mean
: To analyze the risk, or volatility, associated with investing in general electric common stock, a sample of the eight quarterly percent total returns was identi
|
What is the amount required in the retirement fund on day
: What is the amount required in the retirement fund on the day Bodie retires? [Hint: calculate PV of expenses, the form of this stream of expenses is]
|
Compute the variance of z in terms
: Let X and Y be independent random variables with expectations µX, µY and variances s 2 X, s2 Y (sX, sY = 0) respectively.
|
Principles of cybersecurity revolve
: Principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity
|
Indicate the enormity of a problem
: In the Philadelphia area the three largest health problems are heart disease, cancer, and drug overdoses. When considering drug overdoses opioids are the larges
|
Compute for the carrying value of the note in december
: Compute for the carrying value of the note in December 31, 20x10. Compute for the carrying value of the note on January 1, 20x9.
|
Determine variable cost per unit and fixed cost per month
: Use the high low method to determine the variable cost per unit and fixed cost per month. Express your results in the form of a linear equation y = a + bx
|
Personal and communal ethical factors
: What are the personal and/or communal ethical factors that may be involved in determining the moral position of either side given a contemporary debate,
|