Proposed Round Robin CIA Pattern on RTS for Risk Assessment

Proposed Round Robin CIA Pattern on RTS for Risk Assessment

Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Copyright: © 2017 |Pages: 15
DOI: 10.4018/IJDCF.2017010105
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The preventive, detective and corrective control is well advanced automated control in order to attain the maximum objectives of preserving the CIA mechanism on RTS. The risk analysis is the process of identifying the risk on RTS to achieving business objectives and deciding the measure components of RTOS on optimizing the lowest level of risk. This proposed round robin mechanism is going to be implemented on RTOS and mean while providing actionable, accountable & measurable for individuals who are accessing sensitive information on multiple relation functions, operation and services (RFOS) on multiple resources of RTS. We have to develop the RRP for risk assessment on MIMD. This research work going to be applied into security pattern on the measure component of the system security as well as RTOS. Furthermore, this RRP optimize the cost, time & resources is supposed to optimize the system risks and maximize the performance of business, resource & technology all the time & every time.
Article Preview

1. Introduction

The increased applications of business, technology, resources & communications system by IT industries has increased the risk of theft of proprietary information. The real time operating system control & audit is a primary method of protecting system resources (Processor, Memory & Encryption Key). The system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information security. The control is inversely proportional to the Risk & mean while control is directly proportional to the quality of standard(S) (Gupta, 2012). The control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the anti-symmetric model for risk mitigation on large scale Unix operating system based on available product, business & resources (Das, 2009; O’Reilly, 1995; Kai, 2008; Sun-Microsystem, 2002; Tanenbaum,2010).

The real operating system (server system) in large scale has even greater responsibilities and powers for large scale business like web based and mobile computing. It is just like a traffic management system and makes sure that different programs and software packages the users and clients running at the same time do not interfere with each other. The operating system is also responsible for risk and security ensuring that unauthorized users do not access the system (Das, 2009; O’Reilly, 1995; Kai, 2008; Sun-Microsystem, 2002; Tanenbaum,2010).

1.1. Information Security

To assess effectively the security needs of an organization to evaluate and choose various security products and policies, the authority is responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks, the problems are compounded. The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as Security attacks: any action that compromises the security of information owned by an organization. Security mechanism: A process that is designed to detect, prevent, or correct from any security attack. Security services: A processing or communication services that enhances the security of the data processing systems and the information transfer of an organization. The services are intended to encounter security attacks and they make use of one or more security mechanisms to provide the services (Ron, 2002; Stalling, 2006; Schneier, 1996)

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing