Security Attributes Related to The Cyber Security

Requirement

For the purposes of this assignment, security attributes can be anything related to Cyber Security. The "overarching" areas are: Confidentiality, Integrity, Availability, Accountability, Auditability, Authenticity/Trustworthiness, Non-repudiation and Privacy. The security attributes you choose will most likely come from the areas mentioned above. Examples are: Mandatory Access Control, PKI, User onboarding, mantraps, honeypots, etc.
Requirements
Explain briefly any five (5) security attributes by taking examples from every day for illustration and explain why this attribute is justified in the example. For example if you consider confidentiality then provide an example from every day use where confidentiality is leveraged and explain why is it needed in the example given.

Solution

Security Attributes

Cyber security is also known as information technology security which mainly concentrates on protecting computers, programs, networks and data from unauthorized access, destruction or change (Liang, 2013). Security attributes related to the cyber security are following:

 

  1. Mandatory Access Control
    It is a security attribute related to the confidentiality. It is a type of access control in which only the administrator maintains the access controls. The administrator defines the access policy and usage which cannot be changed or altered by any other users. It is mostly utilized in the system where confidentiality is considered a first priority, for example; Astra Linux OS developed specially for Russian Army who has its own mandatory access control (Lewko, 2012). This is because the army requires more security of its confidential reports.

  2. Public Key Infrastructure
    It is a security attribute related to accountability area. It is known as a comprehensive system which is required to provide digital signature and public-key encryption services. Its main motive is to manage the accountability related to certificates and keys, for example;  authentication of documents. It is required for measuring the originality of documents.

  3. User Onboarding
    It is a security attribute related to authenticity area. It is known as a process of enhancing the likelihood that new users become successful when they are using innovative products, for example; Canva is a design tool which can make non-designer goods very attractive. It is required for producing the creative technology goods.

  4. Mantraps
    It is a security attribute related to the area of Privacy. It is known as a small room which has an entry door on one wall and exit door on the other wall. One door of mantrap cannot be opened until another door has been locked, for example; Multidiscipline buildings are specially designed to house a data center (Hur, 2013). It is required to separate non-secure areas from secure areas so that unauthorized access can prevent.

  5. Honeypots
    It is known as a mechanism related to computer security which is mainly established to deflect and detect counteract attempts at unauthorized use of information systems, for example; in a network site, a honeypot consists of data that considered as a legitimated part of the site. It is required for baiting a criminal and then punishing the identified criminal.

Writing assignment and completing it on time is not an easy job. If you forget to write your assignment you can take urgent essay help from Allassignmenthelp.com. We are a team of professional assignment writers who are talented enough to deliver a plagiarism-free assignment within the given frame. On our website, the students can get information technology assignment help at a very affordable price.

References

  • Liang, K., Fang, L., Susilo, W., & Wong, D. S. (2013, September). A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 552-559). IEEE.

  • Lewko, A., & Waters, B. (2012). New proof methods for attribute-based encryption: Achieving full security through selective techniques. InAdvances in Cryptology–CRYPTO 2012 (pp. 180-198). Springer Berlin Heidelberg.

  • Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE transactions on knowledge and data engineering, 25(10), 2271-2282. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order