About Expert

Key Topics
For the purposes of this assignment, security attributes can be anything related to Cyber Security. The "overarching" areas are: Confidentiality, Integrity, Availability, Accountability, Auditability, Authenticity/Trustworthiness, Non-repudiation and Privacy. The security attributes you choose will most likely come from the areas mentioned above. Examples are: Mandatory Access Control, PKI, User onboarding, mantraps, honeypots, etc.
Requirements
Explain briefly any five (5) security attributes by taking examples from every day for illustration and explain why this attribute is justified in the example. For example if you consider confidentiality then provide an example from every day use where confidentiality is leveraged and explain why is it needed in the example given.
Cyber security is also known as information technology security which mainly concentrates on protecting computers, programs, networks and data from unauthorized access, destruction or change (Liang, 2013). Security attributes related to the cyber security are following:
Mandatory Access Control
It is a security attribute related to the confidentiality. It is a type of access control in which only the administrator maintains the access controls. The administrator defines the access policy and usage which cannot be changed or altered by any other users. It is mostly utilized in the system where confidentiality is considered a first priority, for example; Astra Linux OS developed specially for Russian Army who has its own mandatory access control (Lewko, 2012). This is because the army requires more security of its confidential reports.
Public Key Infrastructure
It is a security attribute related to accountability area. It is known as a comprehensive system which is required to provide digital signature and public-key encryption services. Its main motive is to manage the accountability related to certificates and keys, for example; authentication of documents. It is required for measuring the originality of documents.
User Onboarding
It is a security attribute related to authenticity area. It is known as a process of enhancing the likelihood that new users become successful when they are using innovative products, for example; Canva is a design tool which can make non-designer goods very attractive. It is required for producing the creative technology goods.
Mantraps
It is a security attribute related to the area of Privacy. It is known as a small room which has an entry door on one wall and exit door on the other wall. One door of mantrap cannot be opened until another door has been locked, for example; Multidiscipline buildings are specially designed to house a data center (Hur, 2013). It is required to separate non-secure areas from secure areas so that unauthorized access can prevent.
Honeypots
It is known as a mechanism related to computer security which is mainly established to deflect and detect counteract attempts at unauthorized use of information systems, for example; in a network site, a honeypot consists of data that considered as a legitimated part of the site. It is required for baiting a criminal and then punishing the identified criminal.
Liang, K., Fang, L., Susilo, W., & Wong, D. S. (2013, September). A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 552-559). IEEE.
Lewko, A., & Waters, B. (2012). New proof methods for attribute-based encryption: Achieving full security through selective techniques. InAdvances in Cryptology–CRYPTO 2012 (pp. 180-198). Springer Berlin Heidelberg.
Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE transactions on knowledge and data engineering, 25(10), 2271-2282.