Layering and Encapsulation Security Design Essay

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

When designing any security framework for a device, safety enterprise concepts have to be considered. These standards are updated to establish a safe framework that avoids security bugs and unauthorized system access. Safekeeping plan principles are different and guide the design and implementation of other systems. There is no established principle available for designing and executing illegal operations in an organization, amid many information security efforts. Since no solution exists, it is essential to provide a set of design principles governing the design security techniques. The paper aims to compare and contrast between layering and encapsulation security design in an organization.

Layering is a construction theory that uses various safety methods to secure employees, business personnel, and other facets of an organization’s activities. The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures (Alexander, 2020). There is a new network protection coat with layering that delivers security for each sheet, making it difficult to access the network. Rather than relying on one safety line alone, the principle is solid and difficult to penetrate by various security designs such as access cards and two-stage authentication.

Encapsulation is object-oriented isolation. A security plan in this design theory is accomplished by securing an item array in a particular domain. An individual has only a sequence of procedures present in the sub-system used for verification (Pearce, 2020). The processes are not named at random points within the system but only at specific points of entry. In encapsulation theory, messages, records, and files are forwarded via the internet using one or more transport mechanisms or protocols like TCP or IP in a format of data packets. Without tunneling a data packet, encapsulation rules only cover the IP data payload and not the IP header.

How Encapsulation and Layering Influence A Company’s Security Posture

When deciding the type of design concept to use to protect business capital, a business entity should be particular when selecting security design. Layering is essential in preserving an organization’s network and information infrastructure with many benefits over using a single security line. When layered and encapsulated architecture is used, an entity receives maximum benefit. Suppose an attack forces a specific protection line to break. In that case, some are already in the sub-system until the intruder is detected to protect the organization. Therefore, it requires the secrecy of resources, sensitive documents, individuals, and organizations.

Discussion

I cannot entirely agree with the student based on the economy of mechanism since these basic security concepts describe simple and minute security precautions in software and hardware. It would make it possible for testers to survey safety steps thoroughly. If the planned protection system is complicated, the tester will usually take advantage of the architecture deficiency (Sengan et al., 2020). Thus, the easier the design is, the less the measuring system can find the faults. On the other hand, the more challenging the invention, the more opportunities it has for exploiting design defects; it is easy to improve or amend the specification when the security design is transparent. However, people cannot treat a mechanism’s economy as the most robust principle of safety architecture. The need to incorporate protection functions in both hardware and applications is always underway. The same protocol, for example, moves the username via TCP access to the remote host procedure. A host A mechanism that gives access based on an ID protocol results considers the host source credible. If Host B tries to target Host A in response to the identity request, it can link and send any ID it likes. Thus, it is an example of a wrong solution to the world (specifically that host B can be trusted).

Though the question is answered, the information given is all about the general security design. Yet, the discussion required comparison and differences between any two-security design principles. Cybersecurity is not among the security design principles; it is the defense of internet-connected devices such as hardware, applications, and data from cyber-threats. Individuals and enterprises use the practice to defend themselves from unwanted connections to data centers and other computerized networks (Vanover, 2018). Therefore, cybersecurity refers to different procedures, processes, and activities to avoid invasion, disruption, or unauthenticated access by networks, computers, programs, and records. Cybersecurity can also be referred to as IT security.

References

Alexander, R. (2020). Journal of Information Security, 11(04), 261−291. Web.

Pearce, H. (2020). Model-driven engineering for safety and security in industry 4.0 [Unpublished doctoral dissertation]. University of Auckland Research Repository, Research Space.

Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Future Generation Computer Systems, 112, 724−737. Web.

Vanover, J. (2018). Exploring the Cybersecurity Improvements Needed by Internet Game Users to Reduce Cybersecurity Threats [Unpublished doctoral dissertation]. Colorado Technical University.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, September 16). Layering and Encapsulation Security Design. https://ivypanda.com/essays/layering-and-encapsulation-security-design/

Work Cited

"Layering and Encapsulation Security Design." IvyPanda, 16 Sept. 2022, ivypanda.com/essays/layering-and-encapsulation-security-design/.

References

IvyPanda. (2022) 'Layering and Encapsulation Security Design'. 16 September.

References

IvyPanda. 2022. "Layering and Encapsulation Security Design." September 16, 2022. https://ivypanda.com/essays/layering-and-encapsulation-security-design/.

1. IvyPanda. "Layering and Encapsulation Security Design." September 16, 2022. https://ivypanda.com/essays/layering-and-encapsulation-security-design/.


Bibliography


IvyPanda. "Layering and Encapsulation Security Design." September 16, 2022. https://ivypanda.com/essays/layering-and-encapsulation-security-design/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1