StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk-Based Systems Security Engineering - Essay Example

Cite this document
Summary
System designers feel the need to make trade-off decisions related to security. They need to develop secure systems against the attacks of the real world. Morda methodology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Risk-Based Systems Security Engineering
Read Text Preview

Extract of sample "Risk-Based Systems Security Engineering"

Article Summary Security and functionality are competing goals in design of most of the contemporary information systems. System designers feel the need to make trade-off decisions related to security. They need to develop secure systems against the attacks of the real world. Morda methodology is a methodology of systems security engineering can help the designers in making informed decisions. It offers a framework to analyze the complex postures of IS risk by deriving an unbiased metric of risk from the combination of mission impact concepts and threat attack.

Morda methodology is useful in discovering deficiencies in the system and developing the design strategies for the development of stronger systems. The subjectivity of Morda necessitates sensitivity analysis to study the change of attack scores with respect to one another with the change of values of the subjective variables. With Morda assessment, a risk posture can be produced for a proposed architecture, that not only drives the engineering process of the system security but also influences the development of countermeasures.

Costs of the countermeasure include but are not limited to expenses of purchase and maintenance, and backward compatibility whereas the benefit is effective mitigation of the risk. Morda offers an unbiased metric to the decision makers by assessing risk formally and systematically. Thus, decision makers can make informed decisions to identify proper strategy of defense. The Morda process identifies the single attacks that are most lucrative, but it does not consider the attack portfolios that are made over time so that ongoing adversary objectives can be achieved.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk-Based Systems Security Engineering Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Risk-Based Systems Security Engineering Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1614728-risk-based-systems-security-engineering
(Risk-Based Systems Security Engineering Essay Example | Topics and Well Written Essays - 250 Words)
Risk-Based Systems Security Engineering Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1614728-risk-based-systems-security-engineering.
“Risk-Based Systems Security Engineering Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1614728-risk-based-systems-security-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk-Based Systems Security Engineering

Transformation of a Korean Kwangju Bank

The bank's re-engineering was a highly risk affair.... From A Dinosaur To A Chameleon: Transformation of a Korean Bank Date Kwangju Bank The Bank had problems with its computer systems that made it fail to operate appropriately in the market.... The system was too rigid and could not work effectively to respond to the changes that were taking place in the market....
4 Pages (1000 words) Case Study

IT Consultant & Methodolgies

One way of attaining this level is through “social engineering” in this case a user is manipulated into giving out information by tricking them to believe that they ought to give out that information.... Poor briefing of staff members on matters relating to information security procedures Social engineering is a type of an attack where the attackers disguises themselves and try to persuade a legitimate user into giving out sensitive information.... ?? Poor configuration of the firm's network, which allows user's ordinary access to ICMP In this type of security risk, a cracker can attack the system using methodology one....
3 Pages (750 words) Essay

Professional Penetration Testing for Better Security

The paper concerns the attribution of engineering to a certain vision for a structure or a group of structures.... This creates an aesthetic platform upon which architecture may be described as the epitome of the fine art within which engineering finds a mechanism to come alive.... hellip; The depicts architecture as a field that uses only forces such as the harmony of design and engineering to encompass various features that drive people and regions....
6 Pages (1500 words) Term Paper

Managing Finance and Information at Jacobs Engineering

The work "Managing Finance and Information at Jacobs engineering " is focused on effective design and evaluation of information flows through the systems application as information inputs in the database are recognized and modeled according to the logical data modeling process.... hellip; Data values are transformed throughout the data engineering process based on the object-oriented ontology.... This focuses on the logic linkages of data packets, for example, linking the engineering intellectual capital of suppliers to transform into composite information for product development....
7 Pages (1750 words) Coursework

Performance Engineering

This essay "Performance engineering" talks about got many merits for it provides which low costs of today's commodities, computing component and boost advancement of modernized operating systems, as well as the programming languages.... hellip; The daily fundamentals of performance engineering are illustrated by various latest research contracts.... That is the contracts awarded in the field of engineering as well as greater support from the scientific partners....
5 Pages (1250 words) Essay

The Organizations Physical, Human, and Electronic Information Holdings That May Be at Risk

This research will begin with the statement that in today's situation, scrutiny of the physical security of services and properties has to turn out to be an even extra serious feature of an organization's information security and industry stability preparation.... Through resources being protected and procedures covering physical security, operations will gain benefit by an enhancement in security on the physical risk to the information....
11 Pages (2750 words) Research Paper

Fire Safety Systems and Engineering

… The paper "Fire Safety Systems and engineering" is a wonderful example of an assignment on engineering and construction.... Fire Safety engineering is a type of study that is concerned with the development and prevention of fire and the means through consequences of a fire may be reduced to a minimum in human, financial and environmental terms.... The paper "Fire Safety Systems and engineering" is a wonderful example of an assignment on engineering and construction....
13 Pages (3250 words) Assignment

System Security and Rise of Internet due to Advancement of Information Technology

This paper "System security and Rise of the Internet due to Advancement of Information Technology" tells that the internet of becoming an important part of human life as it offers a platform for shopping empowers the citizens, enables people to access information, and even makes the government be transparent.... For instance, via RFID, infrared sensors writing systems, laser scanners, and other sensing devices of information are integrated into an object for data exchange and communication services....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us