CYB 300 Milestone Three Worksheet

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

300

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by LieutenantGoosePerson210

CYB 300 Milestone Three Worksheet I. Security Analysis Table 1
Security Analysis Table Fundamental Security Design Principles Describe how the FSDPs relate to PKI (2–3 sentences) Describe how the FSDPs relate to the CIA triad (2–3 sentences) Isolation In relation to PKI and isolation the example, I have the uses of a token for the authentication process. This token is what the grants the user access of the protected areas in the network. Authentication is linked to isolation, so that would lead into the CIA’s isolationist triad. With that in mind it would need to have and maintain the highest levels of confidentiality and integrity. Modularity Modularity relates to PKI in being that receiving a certificate is an example of modularity. Once the certificate is acquired, it’s uploaded to the database and sent to a server, in turn letting the server inside the subnet you chose. With how similar they are nodes in a network can act independently. This technique can be reused indefinitely. When designing with modularity, ease of use is a must. Minimization of Implementation Minimizing the amount of code needed to handle particular situations can be achieved with other methods such as having set credentials that can operate on any device. Essentially meaning nobody else would be able to log onto the user’s account. Minimizing time and effort used to implement a change is a private principle. This restricts access to your account and the contents within it for only authorized users. Layering Layering connection with a PKI would be along the lines of using a biometric scanner and using something like login credentials. This is a prime example of layers, adding other things onto this would be adding more layers. The concept of layering is connected to the triad through confidentiality. Using the combinations of multiple security methods including authentication ensure authorized access is allowed or authorized individuals may receive access. Least Privilege The least privilege method is by far my Least privilege plays into all 3 roles in 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help