Chapter Summary

This chapter covered various security architecture topics, from the design of access control, to the evaluation of computing systems by international standards. Additionally, a communications protocol standard was introduced from the perspective of security architecture suitable for network communications. Understanding security architecture may just be the lynch pin of future secure computing efforts. Because it is impossible to anticipate future attack substance, those responsible for IT security must return to the philosophy of securing systems first with known security practices, and then later in response to attacks which cannot be met by them.

KEY TERMS

  • Assurance

  • Bell-LaPadula model

  • Biba Model

  • Channel

  • Clark-Wilson model

  • Clearance ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.