This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 4 Chapter 5 Unit 4 Chapter 5 Part 1 Part 1 System Architecture & Design System Architecture & Design (Computer Architecture) (Computer Architecture) 2 Learning Objectives Computer hardware architecture Operating system architecture Trusted Computing Base (TCB) Security Models Assurance evaluation criteria and ratings Certification and accreditation processes Attack types 3 Computer and Security Fundamentals Security Policy Statement that outlines how entities access each other What operations different entities carry out What level of protection is required for a system or software product What actions should be taken when these requirements are not met Outlines what the hardware and software must meet in order to be compliant TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 4 Computer and Security Fundamentals Security Model Blueprint of how security is to be implemented Architecture of a Computer System (fulfills the blueprint) Outlines the requirements necessary to properly support & implement a specific security policy For example, the policy may state all users must be identified, authenticated and authorized before accessing network resources The model provides a deeper explanation of how a computer operating system should be developed to properly support a specific security policy Security is best if designed and built into the foundation of the operating systems and applications not an afterthought 5 Computer Architecture Encompasses all of the parts of a computer system that are necessary for it to function including: Operating System Memory Chips Logic Circuits Storage Devices Input and output devices Security components Buses Networking components 6 Central Processing Unit Brain of the Computer CPU retrieves instructions from memory and...
View Full Document
- Spring '11