logo

Computer Security: Assurance Requirements, System Logs, Access Control Matrices, and Program Security

   

Added on  2023-06-09

5 Pages1125 Words55 Views
 | 
 | 
 | 
1
COMPUTER SECURITY
By:
The Name of the class:
Proferssor:
The Name Of The School:
The City and State where it is located:
The Date:
Computer Security: Assurance Requirements, System Logs, Access Control Matrices, and Program Security_1

2
1.The preferable approach is binding assurance requirements to functional requirements
This is because what the system will do involves Functional requirements system should do
while how the functional requirements will be implemented and tested is what Assurance
requirements is all about .
For example, Consider car safety test. conducting tests stress to check fabric, lock testing
procedure, making sure that intention of the application will be meant by the belt the ,is all
about Verification test for the functions of seat belt, thus functional tests been completed ., this
will me done by crashing of the car inside with the crash-test dummies for proving that the
seat belt is safe for use under normal conditions and that it can withstand the harsh conditions is
what assurance testing is all about.(Huber, Flynn& Mansfield,2013)
Assurance requirements and functional requirements are both needed in software, for the
purpose of gaining confidence of the before launch of the products into a wild environment
such as the Internet.
2. A mechanism for analyzing the security state of a system is provided by logs , to check if
the will system will be put in a non-secure state by a action requested, or events leading to
non-secure state of the system also determined . If all transitions states caused by events , as
well as the values changed objects previous and new values , the state of the system can be
reconstructed at any particular time by use of the system logs. Security problems might be
eliminated when a subset of information is recorded. And the remainder gives a valuable start
point for further clarity .
Confidentiality and integrity are essential for a Chinese Wall model which is a complex
commercial policy. “conflict of interest” class know as COIs and partition which are as a result
of COI into company datasets know as CD are partitions of a model for the set of all subjects
and objects. This may contain information sanitized which nyone can read it, or sensitized
information which only subject in COI class can read it , or by a COI class in which they are in
the class similar to an object and another particular object in CD (O) has already accessed.
san(O) which is a predicate is true if information accceptable is contained only in O, and
false if information unsanitized is contained .there is relevance of any sanitization . logging of
Computer Security: Assurance Requirements, System Logs, Access Control Matrices, and Program Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Online Investment Portfolio Project Charter for Cornerstone Securities
|13
|2029
|472