fbpx

System Security

Table of Contents

Introduction. 3

Discussion. 3

Conclusion. 6

Reference lists. 7

Appendix: Secure system.. 8

Introduction

Safety of the operational technology has been provided by the IT system which has drastically emerged in this present day.  The IT system is now conveying messages to all of the security agents for enhancing their value assets. There are five basic types of system security which have been discussed in this scenario. Application, Internet, Information, end point and also the Network security are the five main types of system security in which research is going on. Each security system has their categorization. This study aims at some security assessment and target of evolution which is the main point and has enormous importance in the security system.

Discussion

Security assurance

A process of the security assurance needs to be understood on the basis of access control and the enforcement over the time. According to the view of Cheng et al. (2019), the national security assistance depends on the system of the thinking and the learning skills of domestic production and the stockpile of the defense products. The main security assurance in the national level depends on politics and the economy of the country. Any kind of the system security depends on policy analysis of a large country to meet the sufficient system distortion of the product and also the input markers. On the other hand the views of Alkhalil et al. (2017), suggests that security assurance can be strengthened by migrating the existing resources to cloud computing. These two points of view suggest that security requirements and the target environment need to be intermingled with the security problem to create the value regarding the security assessment. National security needs to be strengthened first in order to provide protection to the rest of the parts.

Architecture of information security more or less depends on the thinking and the learning skills of the Target of Evolution assessment. As per the view of Singirankabo and Willem (2020), relation between land tenure security and also agricultural productivity depends on mechanisms of IT control. Now in the present days, protection of the Government institution along with the security defects can be easily combined with the access control system. Security assurance testing needs to be prepared in this section which depends on the quality control system and they can also identify the defects in the system security. In the opinion of García et al. (2019), a security assessment program solely depends on the IoT or the Internet of things. The enhancement of the IoT devices in this scenario is crucial for creating the barrier between the risk and protection. For instance- In the case of Nestle, their stakeholder can get access to information about the security solutions which is the first and the foremost option to create security assurance. Standardization, certification, labeling and the roadmap for developing the supply chain depends on security standards and the certification. European Cyber Security Organization (ECSO) is implementing this strategy to provide best security assurance in the case of networking. Networking and gathering the information are determined from the problem in the security by influencers and also the security environment. Boundaries of the security assurance can be understood by the wireless transmission and radio frequency anti cloning device. The views of Wang et al. (2019) suggests that authentication of wireless transmission security can be made by the RF DNA fingerprint technology. For instance- In case of the RF devices the frequency between RF devices can be easily measured. It is one of the best tools for ensuring the security program by challenging the skills of the security tester. Total four statistics maintained here for assuring the security claim. 

Counter arguments

Tools and methods used to test and evaluate the TOE

Surveys, observation and also the case studies are the first and the foremost matter of thinking in this scenario and it also depends on the evaluation of the target. In general, the target of evaluation more or less depends on the type of security that is deeply embedded in the focus groups. National security is the first option which has been discussed in part of security assistance and will no longer be valid in case of attack from an unknown server. Recently a company in Australia named B&C insurance has received some range of threat emails from some unknown server and they claim that they have access to 200,000 clients of this company. The company is using the national level of the security assurance but yet they are receiving the threat emails. This study shows that a problem may arise due to the IoT devices which have been discussed in the first part. As per the view of Aizat et al. (2020), biometric recognition can easily provide some range of security which is the first and the foremost criteria for providing the reinforcement to the IoT system. Conversely, the views of Nam et al. (2020), suggests that generation of strong passwords is important for providing security to any system. These two viewpoints show that there are some ranges of security assessment or assurance which need to be changed for this purpose. In case of any jeopardy in the IoT system, a total loss of data can be observed which is not good for any company having a huge confidential data.

Human user identification and authentication

Human based identification and also the authentication in this scenario can provide the best security system which depends on the physiological requirements of any users. Signature dynamics and also the voice recognition are the key features of human user identification and also authentication. Assurance argument on this part also depends on the sound of steps, gestures and also on behavioral biometrics. According to the view of Vimercati et al. (2017), the authorization model for the multiproviders can make some range of quarries which is important to maintain the physiological requirements. The assurance of the security in case of human user identification and authentication is based on the multitude of the personal information of the users. DNA matching and the signature recognition is the first and the pivotal part of this system which also depends on the certificate based authentication. On the other hand the views of Lin et al. (2019), suggests that the individual identification method of the wireless device can be managed by machine learning and also dimensionally reduction of security assurance. These two points of views suggest that knowledge, possession, inherence and the location factor are the first and the foremost priority to understand the security system problem in the authentication.

Defense of the main security argument

Defense of the main security system depends on the quality of the security and also the implementation of the current technologies in this scenario. In case of the human user identification and also the assurance arguments, entering username and the password in the system of a portal is always a common example of authentication. In order to discuss the defense system of the main security agent it needs to be understood that when any user is entering pass code and the login credential no pop up window is opening on their screen. In case of opening the popup in their window some important information can be accessed by some attackers. The defense of the main security argument is totally based on the justification of transcivillizaiton synergy which comes from mutual respect and also from multiculturalism. Face recognition and also the factor of vein patterns recognition is always in the lists of main security which need to be included in formation of security wall. According to the view of Luburić et al. (2018) enterprise systems must be proceeding with the high level of security by providing a security assurance framework. Security assurance framework relies on the roster study of the thinking and the learning processes by structuring the data assets and also their security goals. The security goals and the assets of the data must rely on the flow of data sourcing and HTTP communication between two servers of the application (Referred to appendix). The framework of the usage model can rely on asset inventory construction and also on the factor of data source analysis. Using the data flow analysis it is possible to generate security assurance cases. The goal of the data protection relies on the N sub goals where N denoting that they are the data assets in the inventory. Protection of the specific assets from the inventory is the primary and the pivotal requirements in providing the system security. 

Conclusion

Presentation of the security assurance in case of the human user identification depends on the form of the compelling arguments that have some wide range of acceptance in certain security targets. Therefore the scope and the boundary for a security related claim in an organization always depends on the problem in their system of security. Target evolution assessments and also the factor of security policy construction can be easily processed by using the asset protection goals which is the first and the foremost matter of understanding in the security program. The system security can be preceded with the thinking and learning skills of a company and also their mode of security assessment skills.

Reference list

Aizat, K., Mohamed, O., Orken, M., Ainur, A. and Zhumazhanov, B., 2020. Identification and authentication of user voice using DNN features and i-vector. Cogent Engineering7(1), p.1751557.

Alban Singirankabo, U. and Willem Ertsen, M., 2020. Relations between land tenure security and agricultural productivity: Exploring the effect of land registration. Land9(5), p.138.

Alkhalil, A., Sahandi, R. and John, D., 2017. An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model. Journal of Cloud Computing6(1), pp.1-20.

Cheng, L.K., Whitten, G.W. and Hua, J., 2019. The national security argument for protection of domestic industries. Journal of Chinese Economic and Business Studies17(4), pp.365-388.

De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. and Samarati, P., 2017. An authorization model for multi provider queries. Proceedings of the VLDB Endowment11(3), pp.256-268.

Lin, Y., Zhu, X., Zheng, Z., Dou, Z. and Zhou, R., 2019. The individual identification method of wireless device based on dimensionality reduction and machine learning. The Journal of Supercomputing75(6), pp.3010-3027.

Luburić, N., Sladić, G., Milosavljević, B. and Kaplar, A., 2018. Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework. ICIST 2018 Proceedings1, pp.16-20.

Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F. and Baldini, G., 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces62, pp.64-83.

Nam, S., Jeon, S. and Moon, J., 2020. Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN. Applied Sciences10(20), p.7306.

Wang, X., Zhang, Y., Zhang, H., Wei, X. and Wang, G., 2019. Identification and authentication for wireless transmission security based on RF-DNA fingerprint. EURASIP Journal on Wireless Communications and Networking2019(1), pp.1-12.

Appendix: Secure system

Leave a Comment

Share via
Copy link
Powered by Social Snap