SECENG module Seminar 4 Group Project Continue your PGP project. In this week, we will concentrate on the following part: digital signatures and certificate chain. Try post messages signed with your...

1 answer below »

View more »
Answered Same DayDec 22, 2021

Answer To: SECENG module Seminar 4 Group Project Continue your PGP project. In this week, we will concentrate...

David answered on Dec 22 2021
130 Votes
Threats have increased by everyday and protecting systems from those systems also have developed in a massive way
Abstract:
Security is the vital factor when it comes to using, selling or buying a system. It matters
a lot to the users as their assets need to be kept in a trustworthy and secure place . This important issue has led the researchers and security experts explore various horizons of real time problems and from studying that model they get an idea that may implemented in security issues that the computing world faces now.
Threats have increased by everyday and protecting systems from those threats also have developed in a massive way. Information needs to be secured and so the user uses all technology and software to secure his assets. In order to keep track of the security provided with the information there is a need for a monitor; mitigating software and hardware to get to see how secure our system is from the threats. We used reference monitors, TPM or Palladium to keep our digital assets safe and secure from possible threats. But it’s that these threats sometimes come in from unexpected direction, form and time. These parameters are ones where all the security software work upon or evolve.
One way to improve and evolve the existing security software is to keep checking for activities logged by the security software just like the checking done as to who entered and exited the premises and when , where a visitor or a logging book kept at the entrance or looking at CCTV footage logs or reports these activities . Similarly regular monitoring by looking into logs and reports of our system and seeking the experts to view these , will help to see how secure our system is.
The other way is to model the threats and this threat model represents the description of the security characteristics where the possible attacks are identified. Thus the potential threats or harms may help us to define as to what has to be prioritized. Thus this method helps us to protect the system from all three unexpected dimensions or corners like time, form and direction. These uses all security expertise available now , improves it as well...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30