Breadcrumbs Section. Click here to navigate to respective pages.
Chapter

Chapter
A Brief Review of the Initial Book
DOI link for A Brief Review of the Initial Book
A Brief Review of the Initial Book book
A Brief Review of the Initial Book
DOI link for A Brief Review of the Initial Book
A Brief Review of the Initial Book book
ABSTRACT
The material discussed in Chapter 1 led to the establishment of five security principles that must be maintained for computing. First is “Know the Players.” In Enterprise Level Security (ELS), the identity certificate is an X.509 PKI certificate issued by an approved Certificate Authority. This identity is required for all active entities, both person and non-person. Second is “Maintain Confidentiality.” This includes end-to-end transport layer security for encrypted communications. It also uses hardware devices to store private keys. The third is “Separate Access and Privilege from Identity.” The separation of identity from access and privilege allows for the breaking of the account paradigm that is the subject of many vulnerabilities. Fourth is “Maintain Integrity.” This involves the use of message authentication codes and digital signatures. Fifth is “Require Explicit Accountability.” Actions are monitored, stored, and analyzed to hold entities accountable for actions. The framework for ELS is developed where ELS combines these security principles into a distributed security system consistent with the tenets, concepts, and requirements derived through the ideas of Chapter 1.