IT 21 - Information Assurance and Security Module 3
IT 21 - Information Assurance and Security Module 3
IT 21 - Information Assurance and Security Module 3
I. Introduction
II. Objectives
After reading this chapter and completing the exercises, you will be able to do the
following:
III. Content
Layering
Layering separates hardware and software functionality into modular tiers. The
complexity of an issue such as reading a sector from a disk drive is contained to
one layer (the hardware layer in this case). One layer (such as the application layer)
is not directly affected by a change to another. Changing from an IDE (Integrated
Drive Electronics) disk drive to a SCSI (Small Computer System Interface) drive
has no effect on an application which saves a file. Those details are contained
within one layer, and may affect the adjoining layer only.
The OSI model (discussed in Chapter 8, Domain 7: Telecommunications and
Network Security) is an example of network layering. Unlike the OSI model, the
layers of security architecture do not have standard names that are universal across
all architectures. A generic list of security architecture layers is as follows:
1. Hardware
2. Kernel and device drivers
3. Operating System
4. Applications
In our previous IDE ! SCSI drive example, the disk drive in the hardware layer
has changed from IDE to SCSI. The device drivers in the adjacent layer will also
change. Other layers, such as the applications layer, remain unchanged.
Abstraction
Abstraction hides unnecessary details from the user. Complexity is the enemy of
security: the more complex a process is, the less secure it is. That said, computers
are tremendously complex machines. Abstraction provides a way to manage that
complexity.
A user double-clicks on an MP3 file containing music, and the music plays via
the computer speakers. Behind the scenes, tremendously complex actions are taking
place: the operating system opens the MP3 file, looks up the application associated with
it, and sends the bits to a media player. The bits are decoded by a
media player, which converts the information into a digital stream, and sends
the stream to the computer’s sound card. The sound card converts the stream into
sound, sent to the speaker output device. Finally, the speakers play sound.
Millions of calculations are occurring as the sound plays, while low-level devices
are accessed.
Abstraction means the user simply presses play and hears music.
IV. Activities
V. References