Software Development Life Cycle or SDLC – the Process of Planning, Developing and Maintaining Secure Software

Finjan TeamBlog, Cybersecurity

Finjan Software Development Life Cycle or SDLC   the Process of Planning, Developing and Maintaining Secure Software

With digital technology so much a part of our daily lives, it’s easy to take software for granted. If an application on our desktop, laptop, or mobile system works, that’s all we’re concerned about. We may not even think of it as software, at all. But if a system or app malfunctions, or if there’s an unwanted intrusion from viruses … Read More

A Closer Look at Multilevel Lattice Security Models

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Multilevel Lattice Security Models

Organizations looking to regulate access to the information they routinely work with, and computer systems and communications networks seeking to preserve the confidentiality and integrity of the data they store or transmit will typically require some kind of formalized framework to govern how this is done. Information classifications such as Universal, Unclassified, Confidential, Secret, and Top Secret are one manifestation … Read More

The Non-Interference Model

Finjan TeamBlog, Cybersecurity

Finjan The Non Interference Model

Security models of control are used as a way of formalizing a security policy. They determine in one way or another how security will be implemented across a system or network, which subjects are permitted access to the system, and which objects they are allowed access to. These security models are typically put in place by enforcing confidentiality, integrity, or … Read More