Tuesday, October 29, 2019
Information Security Physical Security models Essay
Information Security Physical Security models - Essay Example It achieves this by describing steps followed to achieve security goals of an institution. Security models are great tools in evaluating the security in place. Gregory (2010) outlines information various security models that have been developed such as the following: The Bell-LaPadula model is evidently a notable achievement in computer security. Several other models followed suit, with either improvements on their predecessors or variations. The Harrison-Ruzzo-Ullman (HRU) is an example of a general model in comparison to the Bell-LaPadula model which captured confidentiality aspects of access control. There emerged other models such as Chinese Wall model, the Biba and Clark-Wilson models that were more integrity based as well as the Information flow and non-interference models that centered on perfection. All these models were developed to safeguard information and information systems from leakages, unauthorized access and rights violation. However, the above models are more software based rather than physical. Threats to physical security involve disruption of services, theft, malicious physical damage, unlawful leakage and loss of system reliability. In any case, however, similar to general information security, physical security calls for a layered defense model. A layered security model will emanate from the perimeter and zero in on the asset; in this case, information. Layered security models will serve to achieve: deterrence, delaying, detection, assessment and response in a bid to fulfill the security objective. A physical security model must, therefore, be able to address the above threats efficiently and comprehensively. According to the US Army Field Manual 3-19.30 (2001, January 8) physical security is that part of physical measures designed to ensure the safety of personnel; to thwart unlawful access to equipment, the installations
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.