CRYPTOGRAPHY. Ch 4: A Model for Information Security Planning Mohammed Minhajuddin Khan. Topics. Information System Architecture And Design Layer Specify the information system security measures.
Ch 4:A Model for Information Security Planning
Mohammed Minhajuddin Khan
This level generally operate in an open environment, So we can’t expect choke security. The information security specialist should be concerned with
The web services are browsing simple or complex information, file transfer, name and address resolution, secure funds transfer, transaction processing, and use of the web for private communications. Here the information is public, so the cryptographic methods should provide secure transactions & have to be more complex to break.
Goals to accomplish in this layer:
The primary concerned at this layer is with attacks against the brand, infiltration of client-side systems, springboard attacks, denial-of-service attacks, and malware.
The information security breaches are most often caused by either human error or an inconsistency in the implementation of security procedures. By developing a plan that is concerned with the 8 Ps of information security, planners are likely to gain more cooperation and acceptance of the plan.
By working through the eight Ps, our plan will become more acceptable to the user community.
People will become more involved in security because you will have given them a role to play and goals to meet.
Jqf vb cqn jnrxnbc yvex ve cqn bntdavcl tqrve? Ufnb cqvb jnrxnbc yvex qrin rel afyn, vo bf cqne Ve jqvtq Yrlna? Savnoyl unbtavsn cqn afyn fo cqvb jnrxnbc yvex ve cqrc Yrlna?
Who is the weakest link in the security chain? Does this weakest link have any role, if so then in which Layer? Briefly describe the role of this weakest link in that Layer?