Data Protection and Security |
||||||
I |
Introduction to Information Security |
|||||
I.IV |
Principles of Security |
|||||
7. Finally: we repeat here the list of principles, Gollmann gave on computer security.
Applications
Services Operating System OS Kernel Hardware We would like to elaborate more on this last principle. Unlike the one we provide, Golmann’s list is rather a technical one up to this point however the final principle demonstrates the need to incorporate the physical and organizational security measures into technical ones (see the figure below). As an example, consider the case when your computer is physically not protected. Then, no matter how sophisticated your authentication mechanisms are, an attacker can simply obtain the confidential information located in your computer’s hard disk by physically accessing the hard disk and read and restore the file structure with some recovery tools. |
Figure depicts the need to incorporate the physical and organizational security measures into technical ones. |
|||||
I.IV.Q |
[+] Questions
[-] QuestionsShould the protection mechanisms in a computer system focus on data, operations or users? Which one you think would be more user-friendly? In which layer of the computer system should a security mechanism be placed? Is there any similar layering for other systems? Why does simplicity implies higher assurance? (Remember our discussion on “systems”) |
|||||
|
||||||
|
concepts » | |||||