Verified Document

Technological Innovations In Security Over Research Paper

This helps the nation to be able to protect its most vital secrets, by having a system that determines how and when information is released. Identify and discuss at least three modern-day security applications that help both private and public security personnel secure locations and facilities.

Three different security applications that are being currently used include: network, host and anomaly-based protocols. A network-based solution is when you are analyzing the traffic patterns at your servers. This is important, because many unfriendly regimes will often try to conduct cyber attacks as a way to gain access to sensitive information. One way to monitor for this is to analyze the traffic patterns, where you are looking for unusual spikes. This will tell an organization early, if they are being targeted. A host-based protocol is when you are watching user logins and the kind of pages that people are visiting. In this case, security personnel want to identify anything that could be suspicious (i.e. A...

Anomaly-based solutions are when you are looking for unusual changes to consistent patterns. This would include everything ranging from: unusual activity at a server to receiving strange phone calls. The basic idea is to combine all of the different security solutions together to: identify if a possible physical or virtual threat exists. ("Maximum Security," 2003, pp. 235- 242)
Clearly, the overall nature of the threat facing most organizations has been continually changing. Part of the reason for this, is because many unfriendly regimes have begun to: target various government and military infrastructure projects. As a result, the tactics that are being utilized to defend against these kinds of challenges has been continually shifting.

Bibliography

Bell LaPladula Model. (2006). University of North Carolina. Retrieved from: http://www.cs.unc.edu/~dewan/242/f96/notes/prot/node13.html

Maximum Security. (2003). Indianapolis, IN: Sams.

Sources used in this document:
Bibliography

Bell LaPladula Model. (2006). University of North Carolina. Retrieved from: http://www.cs.unc.edu/~dewan/242/f96/notes/prot/node13.html

Maximum Security. (2003). Indianapolis, IN: Sams.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now