Security and Ethical Policies in Information Technology: An Analytical Report

Analytical report on security and ethical policies.

Lily Green
Contributor
5.0
30
7 months ago
Preview (2 of 5 Pages)
100%
Purchase to unlock

Page 1

Security and Ethical Policies in Information Technology: An Analytical Report - Page 1 preview image

Loading page ...

Security and Ethical Policies in Information Technology: An AnalyticalReport1. (TCO A) You are responsible for developing a security evaluation process that can be used to assessvarious operating systems both during and after development. List the five most desirable qualitiesyour evaluation process should have and explain why they are important. (Be sure to address qualitiesof the evaluation process, not specific metrics for assessment of operating systems.) (Points : 40)The evaluation process can be approached and attempted with our own set of parameters. Thedesirable qualities that would be important for the evaluation process have been described below-SpeedThis is to ensure that in the product is ready for the competitive market soonest possible, giventhat time is money and companies need to get their products out in the market as soon as possibleThoroughnessThis is required to guarantee that all the various features and aspects of the producthave been evaluatedPortabilityThis quality ensures that the product is platform independent and that the evaluation isapplicable without any platform related constraints or dependencies, thus allowing the evaluationprocess to be used for a range of systems and productsConsistencyThis criterion is to ensure that all similar products are judged and evaluated based on thesame set of parameters, and that the same product when judged by different panels receive the sameresultsGranularityThis is to ensure that the evaluation of the product is based on adequate level of detailing,which ensures that all parts of the system are evaluated effectively2. (TCO B) The Open Systems Interconnection model is inherently inefficient. On the source host, eachlayer must take the work of higher layers, add some result, and pass the work to lower layers. On thedestination host, each layer must process these results from lower layers and pass the appropriateinformation to upper layers. Surely this wrapping and unwrapping process is inefficient. Assess thesecurity advantage of this layered approach. (Points : 40)As per the Open Systems Interconnection, or the OSI model, there are seven layers through which amessage needs to pass from a source to a destination machine. Each of the layers perform differentfunctionalities, and are together responsible for the complete and secure transmission of the message.Each layer performs some sort of function on the message before passing it to the next layer. Thismechanism ensures high level of security. For example, at the source system, the seventh layer, or the

Page 2

Preview Mode

This document has 5 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all