Principles of cybersecurity revolve

Assignment Help Basic Computer Science
Reference no: EM132908665

Question: Reply to the discussion Below: Domain Seperation COLLAPSE The first principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity.

Since not all systems are designed in the same way there is no one cybersecurity methodology but rather core qualities that help promote it. There are 10 first cybersecurity principles identified by the National Security Agency (NSA). The 10 principles are (1) domain separation, (2) process isolation, (3) resource encapsulation, (4) least privilege, (5) layering, (6) abstraction, (7) information hiding, (8) modularity, (9) simplicity, (10) minimization. For the purpose of the discussion board domain separation will the principle of emphasis.

Domain separation is concept of separating data, processes, and administrative tasks into logically defined domains (Servicenow 2020). Domains in a computer are collection of data or instructions.

For example, most computers have two domains. A supervisory domain that runs the OS and the user domain. The supervisory domain gives direct access to the RAM and also be able to manipulate certain aspects of the operating system.

The domains outside a computer can be an area of responsibility. For example, an application like Netflix will have individual domains for their customers so that they are able to watch their shows and customize their suggestion on a individual basis. This domain would separate to that of different customers. There would also be administrative domains where Netflix could dictate rules, block access to individual and also make sure the overall system is working.

With the understanding of what domains are it is helpful to see define domain separation in layman's terms. Domain separation something like securing an apartment building. Each apartment has different tenants with various items they would like to protect. They secure these items by locking the door to their apartment so that no one else may enter it effectively securing it. Though on occasion a there maybe be able to break into an apartment it is very rare that they would be able to break into all the apartments within the building since each of those apartments are individually locked with different keys. This is essential the same concept with domain separation with applications. This is useful for businesses who wish to separate data into individual categories so they can protect it as well as organize it. Reference Servicenow. (2020, July 23).

Reference no: EM132908665

Questions Cloud

What is the maximum initial cost the company : Och, Inc., is considering a project that will result in initial after tax cash savings of $1.72 million. What is the maximum initial cost the company
What is the value of the sample mean : To analyze the risk, or volatility, associated with investing in general electric common stock, a sample of the eight quarterly percent total returns was identi
What is the amount required in the retirement fund on day : What is the amount required in the retirement fund on the day Bodie retires? [Hint: calculate PV of expenses, the form of this stream of expenses is]
Compute the variance of z in terms : Let X and Y be independent random variables with expectations µX, µY and variances s 2 X, s2 Y (sX, sY = 0) respectively.
Principles of cybersecurity revolve : Principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity
Indicate the enormity of a problem : In the Philadelphia area the three largest health problems are heart disease, cancer, and drug overdoses. When considering drug overdoses opioids are the larges
Compute for the carrying value of the note in december : Compute for the carrying value of the note in December 31, 20x10. Compute for the carrying value of the note on January 1, 20x9.
Determine variable cost per unit and fixed cost per month : Use the high low method to determine the variable cost per unit and fixed cost per month. Express your results in the form of a linear equation y = a + bx
Personal and communal ethical factors : What are the personal and/or communal ethical factors that may be involved in determining the moral position of either side given a contemporary debate,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd