Principles of cybersecurity revolve

Assignment Help Basic Computer Science
Reference no: EM132908665

Question: Reply to the discussion Below: Domain Seperation COLLAPSE The first principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity.

Since not all systems are designed in the same way there is no one cybersecurity methodology but rather core qualities that help promote it. There are 10 first cybersecurity principles identified by the National Security Agency (NSA). The 10 principles are (1) domain separation, (2) process isolation, (3) resource encapsulation, (4) least privilege, (5) layering, (6) abstraction, (7) information hiding, (8) modularity, (9) simplicity, (10) minimization. For the purpose of the discussion board domain separation will the principle of emphasis.

Domain separation is concept of separating data, processes, and administrative tasks into logically defined domains (Servicenow 2020). Domains in a computer are collection of data or instructions.

For example, most computers have two domains. A supervisory domain that runs the OS and the user domain. The supervisory domain gives direct access to the RAM and also be able to manipulate certain aspects of the operating system.

The domains outside a computer can be an area of responsibility. For example, an application like Netflix will have individual domains for their customers so that they are able to watch their shows and customize their suggestion on a individual basis. This domain would separate to that of different customers. There would also be administrative domains where Netflix could dictate rules, block access to individual and also make sure the overall system is working.

With the understanding of what domains are it is helpful to see define domain separation in layman's terms. Domain separation something like securing an apartment building. Each apartment has different tenants with various items they would like to protect. They secure these items by locking the door to their apartment so that no one else may enter it effectively securing it. Though on occasion a there maybe be able to break into an apartment it is very rare that they would be able to break into all the apartments within the building since each of those apartments are individually locked with different keys. This is essential the same concept with domain separation with applications. This is useful for businesses who wish to separate data into individual categories so they can protect it as well as organize it. Reference Servicenow. (2020, July 23).

Reference no: EM132908665

Questions Cloud

What is the maximum initial cost the company : Och, Inc., is considering a project that will result in initial after tax cash savings of $1.72 million. What is the maximum initial cost the company
What is the value of the sample mean : To analyze the risk, or volatility, associated with investing in general electric common stock, a sample of the eight quarterly percent total returns was identi
What is the amount required in the retirement fund on day : What is the amount required in the retirement fund on the day Bodie retires? [Hint: calculate PV of expenses, the form of this stream of expenses is]
Compute the variance of z in terms : Let X and Y be independent random variables with expectations µX, µY and variances s 2 X, s2 Y (sX, sY = 0) respectively.
Principles of cybersecurity revolve : Principles of cybersecurity revolve around the concept that there are foundational principles that promote cybersecurity
Indicate the enormity of a problem : In the Philadelphia area the three largest health problems are heart disease, cancer, and drug overdoses. When considering drug overdoses opioids are the larges
Compute for the carrying value of the note in december : Compute for the carrying value of the note in December 31, 20x10. Compute for the carrying value of the note on January 1, 20x9.
Determine variable cost per unit and fixed cost per month : Use the high low method to determine the variable cost per unit and fixed cost per month. Express your results in the form of a linear equation y = a + bx
Personal and communal ethical factors : What are the personal and/or communal ethical factors that may be involved in determining the moral position of either side given a contemporary debate,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Act of internet crime took place

Please describe an instance of which you are aware of which an act of internet crime took place.

  Account balance after depositing the check

Your bank account was overdrawn by $14. You then were charged a $35 overdraft fee. The bank applies a $5 fee for each day your account is overdrawn. Your account is overdrawn for 3 days when you deposit a check for $256. What is your account balance ..

  Cryptography and steganography

What are the advantages or disadvantages of cryptography and steganography and which method would you consider to be more commonly used in InfoSec?

  Frameworks with respect to business and it strategy

Discuss the purpose, role, and use of EA Frameworks with respect to business and IT strategy

  Principal of the loan

A loan is repaid by making payments of $5000.00 at the end of every six months for fourteen years. If interest on the loan is 8% compounded quarterly, what was the principal of the loan? Note: Different periods of compounding and repayments.

  What is an information system

What is an information system? How does it work? What are its management, organization, and technology components? Why are complementary assets essential for ensuring that information systems provide genuine value for organizations?

  Discuss the current methodologies used to secure wired

Discuss the current methodologies used to secure wired or wireless networks via current Firewall technologies and the potential exposures that currently exist

  Preparing er diagram for er schema

The university keeps track of each student's name, student number, social security number, current address and phone, permanent address and phone, birthdate, class (freshman, sophomore, ..., graduate), major department, minor department (if any), ..

  Industry experts believe blockchain is technology

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Improvements in the delivery of health care to patients

Several weeks ago, your healthcare organization's board of directors asked you, along with a team of others within your department, to research the following

  Natural byproduct of an interconnected world

E-commerce is a natural byproduct of an Interconnected world.

  Establishment of enterprisewide architecture as envisioned

Describe all of potential benefits that Nationstate would realize from the establishment of enterprisewide architecture as envisioned by Jane Denton?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd