Secure by Design?
SECURITY BY DESIGN by M. James Tanner A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science University of Advancing Technology August 10, 2009 © M. James Tanner, 2009 SECURITY BY DESIGN by M. James Tanner has been approved August 10, 2009 APPROVED: VICTORIA SCHAUFUSS, PhD (ABD), Chair GREG MILES, PhD, CISSP, CISA, CISM, IAM, IEM, Independent Reviewer SHELLEY KEATING, MSIT, IEM, IAM, CCNA, MCSE+l, Network+, A+, CTT+, Independent Reviewer AL KELLY, MSIS, MCSA, MCSE 2000m /2003, IEM, IAM, Network+, A+, MCT, Independent Reviewer ACCEPTED AND SIGNED: __________________________________________ VICTORIA SCHAUFUSS, PhD (ABD) Abstract Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not used to be such a prominent issue because computers were not connected 24/7, they used dialup and did not experience the effects from connecting to multiple computers. Today computers connect to high speed Internet and seem useless without access to email, chat, Internet, and videos. This interconnectedness of computers has allowed the security of many computers to be compromised because they have not been programmatically secured. The core component of computer security might best be done through security layers protecting the operating system.
[Show full text]