Computer security policy - Wikipedia [PDF]

A computer security policy defines the goals and elements of an organization's computer systems. The definition can be h

3 downloads 42 Views 54KB Size

Recommend Stories


COMPUTER SECURITY
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Security Policy
Don't fear change. The surprise is the only way to new discoveries. Be playful! Gordana Biernat

Security Policy
Learn to light a candle in the darkest moments of someone’s life. Be the light that helps others see; i

[PDF] Computer Security: Art and Science
The happiest people don't have the best of everything, they just make the best of everything. Anony

[PDF] Online Computer Security: Principles and Practice
Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will

[PDF] Computer Security: Principles and Practice
Seek knowledge from cradle to the grave. Prophet Muhammad (Peace be upon him)

Computer security Lecture 07
Keep your face always toward the sunshine - and shadows will fall behind you. Walt Whitman

Computer Security Solution Manual
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

Security Assessment Security Policy Assessment
Love only grows by sharing. You can only have more for yourself by giving it away to others. Brian

Analyzing Computer Security
What we think, what we become. Buddha

Idea Transcript


Computer security policy A computer security policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines whether a computer system is secure or insecure. These formal policy models can be categorized into the core security principles of: Confidentiality, Integrity and Availability. For example, the BellLa Padula model is a confidentiality policy model, whereas Biba model is an integrity policy model.

Contents Formal description Formal policy models Confidentiality policy model Integrity policies model Hybrid policy model Policy languages See also References

Formal description If a system is regarded as a finite-state automaton with a set of transitions (operations) that change the system's state, then a security policy can be seen as a statement that partitions these states into authorized and unauthorized ones. Given this simple definition one can define a secure system as one that starts in an authorized state and will never enter an unauthorized state.

Formal policy models Confidentiality policy model Bell-La Padula model

Integrity policies model Biba model Clark-Wilson model

Hybrid policy model Chinese Wall (Also known as Brewer and Nash model)

Policy languages To represent a concrete policy especially for automated enforcement of it, a language representation is needed. There exist a lot of application specific languages that are closely coupled with the security mechanisms that enforce the policy in that application. Compared with this abstract policy languages, e.g. the Domain Type Enforcement-Language, are independent of the concrete mechanism.

See also Anti-virus Information Assurance - CIA Triad Firewall (computing) Protection mechanisms separation of protection and security ITU Global Cybersecurity Agenda

References Bishop, Matt (2004). Computer security: art and science. Addison-Wesley. Feltus, Christophe (2008). "Preliminary Literature Review of Policy Engineering Methods - Toward Responsibility Concept". Proceeding of 3rd international conference on information and communication technologies : from theory to applications (ICTTA 08), Damascus, Syria; Preliminary Literature Review of Policy Engineering Methods - Toward Responsibility Concept (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp ?arnumber=4529912&language=fr). External link in |publisher= (help) McLean, John (1994). "Security Models". Encyclopedia of Software Engineering. 2. New York: John Wiley & Sons, Inc. pp. 1136–1145. Retrieved from "https://en.wikipedia.org/w/index.php?title=Computer_security_policy&oldid=696427445"

This page was last edited on 23 December 2015, at 02:27. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.