blog




  • Essay / Management System Authentication - 1284

    Confidentiality, integrity and availability are the cornerstones of information assurance. Combined with the concept of authentication, these tenants provide administrators with the attention needed to protect information systems from adversaries. If I were to create a learning management system similar to WebTycho for Booz Allen, it would be essential to incorporate these security goals when developing the collaboration tool. Privacy is the concept of making data accessible only to people or systems authorized to do so. access it (Pfleeger & Pfleeger, 2006, p. 256). In relation to a learning management system, this would require that an individual's personal data such as grade information, communications and activity logs not be made available to other users. Access control systems often allow administrators to integrate a level of confidentiality within an information system. More specifically, the Bell-LaPadula model is particularly known for ensuring data privacy. The Bell-LaPadula system was proposed by David Bell and Len LaPadula in response to concerns expressed by the United States Air Force about its flight safety. information systems (Blanton, 2010). In 1973, engineers developed the model to focus specifically on protecting data privacy (Blanton, 2010). The Bell-LaPadula security model assigns subjects and objects within an information system a label that indicates its security classification (Balon & Thabet, 2004). Essentially, security labels are used to identify the minimum levels of security required to access resources. The Bell-LaPadula access control model follows two properties, the simple security property and the star property...... middle of paper ......wo or the aforementioned three authentication factors must be integrated . If the new system mirrored WebTycho's, a simple username/password authentication process would be sufficient. By carefully addressing confidentiality, integrity, availability, and authentication throughout the learning management system development process, administrators can ensure a greater sense of security. within the tool. Works Cited Balon, N. and Thabet, I. (2004). The Biba security model (p 1-4). University of Michigan Blanton, M. (2010). Computer security: Multi-level security (p 3-27). The University of Notre Dame Pfleeger, CP and Pfleeger, SL (2006). Computer security. Upper Saddle River, NJ: Pearson Education, Inc. Vacca, J.R. (2009). Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann Publishers.