From the course: Cybersecurity Foundations: Security Architecture

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Collecting your core trust management capabilities

Collecting your core trust management capabilities

From the course: Cybersecurity Foundations: Security Architecture

Collecting your core trust management capabilities

- [Instructor] Trust management is about designing a cybersecurity program that enables legitimate users and activity by providing ground rules for acceptable use and sometimes deploying guard rails on the data and programs themselves. This may seem strange, but think about highways where drivers are pretty good, though not perfect, at staying within their lanes. That's policy. But, in higher risk areas like bridges or work areas, they often erect physical barriers to keep cars from changing lanes. That's like in cryptography. Let's consider three core aspects of trust management. First, we'll identify the elements or objects associated with the trust management discipline. Second, we'll look at the administrative tools available to support the discipline and automate some of the processes. And finally, we'll identify the real-time solutions available to protect our computing environment from a trust management…

Contents