{"title":"Multi-Tiered Approach to System Security","authors":"Peppe Barbarino","doi":"10.1109/SP.1980.10004","DOIUrl":null,"url":null,"abstract":"When a system is designed to process several levels of classified information, a multi-tiered approach to system security is needed. The total security system should be divided into eight areas which cover: Separation of Authority Personnel Security Physical Security Emanation Security Terminal Security Operating System Security File Security Audit Trail The purpose of the security system is to ensure that adequate safeguards are infused to protect information through the system's hardware and software design, and by other appropriate administrative, physical and personnel security controls. Because of the sensitive nature of the data being processed, these procedures must be judiciously implemented, carefully managed, regularly reviewed and continuously monitored.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"38 1","pages":"114-121"},"PeriodicalIF":0.0000,"publicationDate":"1980-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1980.10004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
When a system is designed to process several levels of classified information, a multi-tiered approach to system security is needed. The total security system should be divided into eight areas which cover: Separation of Authority Personnel Security Physical Security Emanation Security Terminal Security Operating System Security File Security Audit Trail The purpose of the security system is to ensure that adequate safeguards are infused to protect information through the system's hardware and software design, and by other appropriate administrative, physical and personnel security controls. Because of the sensitive nature of the data being processed, these procedures must be judiciously implemented, carefully managed, regularly reviewed and continuously monitored.