Threats Models and Integrity Tools

  • Post category:Post
  • Post comments:0 Comments

Threats Models and Integrity Tools

Data in computers is often under threat of an attack from the outside. A threat model in the systems prioritizes these threats according to their acuteness and creates mitigation process (Bau, 2011). Integrity tool ensures file security by reading resources as if files in file systems for any change in file themselves as well as the file registry keys.

#1. Integrity data flow diagrams mainly constitute of two major elements, the host component and admin console. The host component receives and replies to requests from the admin console rather than running the tool using the operating systems whose security might be compromised, This requests are received and replied as raw data to the admin console which does the main analysis. The administrative console carries out core analysis and storage of information on files and registry data on the host running the integrity software (Bau, 2011). A Student Sample: Click here to ORDER NOW

#2. Tampering with data in databases may lead to a threat to information therein (Deng, 2011). By changing minor or major details on the data stored in systems, the resulting effect on the subject company may be tremendous. Denial of service is another threat that mainly affects the flow of data. The attacker either makes the client or the server unavailable or unusable. Repudiation is whereby the attacker uses the logging details of the user to access the systems. By accessing the system login details the attacker can change them and thereby restrict the user from accessing the login processes.

Data is like a treasure trove for an attacker with malicious intent. The security systems in the server are maybe the only prevention of access to sensitive information in our computers. In addition to this, the integrity tool ensures due checks on files and registry data for manipulation (Bau, 2011). The integrity tool also acts as a whistle-blower to the user in case the attacker bypasses the server firewall. A Student Sample: Click here to ORDER NOW

References

Bau, J., & Mitchell, J. C. (2011). Security modeling and analysis. IEEE Security Privacy9(3), 18-25.

Deng, M., Wuyts, K., Scandariato, R., Preneel, B., & Joosen, W. (2011). A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering16(1), 3-32.

Leave a Reply