Preview

$10.00

  • Bf866d45bc4b643a0cbdc9deed6d3d10e957ae12
  • 2ae33338a580f23c80406e2f40218b3392dbd39f
  • 11966e17ad93b78ebbb6db0c94147ecaedcc1831
  • 78c1cd58b1af88dfe34306814f28591ebeba0074

|

Purchase Paper

Security Models for Sensitive Information

Technology 700 Words 3 Pages
Paper Details

Question

What are the security models for sensitive information?

Solution

  • Title: Security Models for Sensitive Information
  • Length: 3 pages (700 Words)
  • Style: N/A

Preview

Reference Information: Lu, T., Guo, X., Zhao, L., Li, Y., Lin, P., & Fang, B. (2015). Security Model for Sensitive Information Systems and Its Applications in Sensor Networks. International Journal of Security and Its Applications, 9(5), 1-18.

Purpose of Study: The paper seeks to expound on current understanding of information security by demonstrating the progress that has been made since the pre computer years and offers a depiction of cyber space and security. Further, the paper proposes the PDRL security model, which details six essential security attributes of information systems that are considered sensitive. Lastly, the paper analyzes the controllability attribute of security systems and proposes a model that will help in the controllability of sensitive sensor networks.

Sampling Comments: In 2011, the United States Department of Defense asserted that “cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace” (Department of Defense of the United States, 2011). In this regard, it presented that cyberspace is a worldwide domain that consists of interdependent networks of information systems such as telecommunication networks, and the internet among others. Michael E. Whitman, a US computer security expert recommended a new framework for security that included confidentiality, availability, integrity, utility, possession, and authenticity (Lu et al., 2015; Friedman et al., 2013). Information security has gained a lot of attributes due to its constant growth; for instance, it has been described as a dynamic process that consists of detection, protection, recovery, and response developments. Other attributes that have been gained over the years include the reliability of different systems, and the survivability of information systems within a network. In the same way, the ISO posited that information security possessed three main attributes which included integrity, availability, and confidentiality.

Full paper available for: $10.00