Monday, May 18, 2020

The Characteristics Of Information Security - 1156 Words

1. Select one of the three characteristics of information security (CIA) and explain its importance as related to the development of policy, education, OR technology. The key characteristic of the information security CIA triad I will focus on is confidentiality. Confidentiality is an important part of any organization’s business operations and every precaution must be taken to safeguard information so that it doesn’t get into the wrong hands. In today’s world of career hackers and large, cybercriminal organization, nothing should be left to chance. Information that can be sold on the black market that includes people’s social security numbers or credit card numbers is highly targeted. In addition to financial information, medical records and government documents are also highly sought after by criminals. Organizations should implement the use of technology to restrict access to this valuable information. One such method to deter hackers is the use of encryption. Encryption is simply the process of encoding data into another form, called ciphertext so that hackers cannot read, alter or gain access to it. This creates a layer of protection so that the information can be deciphered only by the authorized parties. The goal of using an encryption system is to protect the privacy of any digitally stored data on a computer system or data transmitted through the internet. Encryption can help protect systems fight viruses and malware that can be used to gain access to privateShow MoreRelatedStudent1123 Words   |  5 PagesJohn Moura Chapter 1 – Introduction to the Management of Information Security Review Questions 1. A globally interconnected commercial world has emerged from the technical advances that created the Internet. Has its creation increased or decreased the need for organizations to maintain secure operation of their systems? Why? Answer: As Internet use continues to rise, the amount of â€Å"malicious entities† is also rising. As â€Å"malicious entities† grow and become more numerous, theRead Moreinformation system1104 Words   |  5 Pagesï » ¿1, Distinguish data from information and describe the characteristics used to evaluate the value of data? Data versus Information 1 ,Data 2, information 3,knowledge. 1, Data raw facts, such as an employee s name and number of hours worked in a week, inventory part numbers, or sales orders .several types of data can be used to represent these facts Data Represented by alphanumeric data numbers, letters, and other characters image data graphic images or pictures Read MoreInformation Security Essay865 Words   |  4 Pages(assuring the security of utility services) related to information security? Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system. 4. What type of security was dominant in the early years of computing? The type of security was dominant in the early years of computing security was entirely physicalRead MoreBiometric Codes And Biometric Identification1637 Words   |  7 PagesIntroduction: A biometric is defined as a unique, measurable, biological characteristic or trait which is used to identify individuals. Most widely used biometric characteristics to identify individuals include Face, Fingerprint, Hand geometry, Retina, Iris, Voice etc. Biometric identification consists of two stages: †¢ Enrollment: During the enrollment stage, a sample biometric is acquired from the individual. Unique characteristics this sample are then extracted to form a biometric template which isRead MoreA Survey On Security Data Sharing Application For Decentralized Military Network Essay1740 Words   |  7 PagesTITLE: A Survey on Security in data sharing application for Decentralized military network. Abstract: Portable hubs in military situations, for example, a front line or a threatening locale are liable to experience the ill effects of irregular system network and continuous allotments. Interruption tolerant system (DTN) advances are getting to be fruitful arrangements that permit remote gadgets conveyed by officers to correspond with one another and access the classified data or summon dependablyRead MoreSafeguarding Electronic Information Security Policies1172 Words   |  5 PagesSafeguarding electronic information with information security policies is necessary. Information security can be defined as the protection of information and information systems against unauthorized access of information and against the denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter these threats. Information security is consists of computer security and communications security. This paper will discuss how organizat ionsRead MoreFirewalls: Preventing Unauthorized Access Into a Network977 Words   |  4 PagesFirewalls are used in businesses to help prevent attacks, mitigate security issues, and provide a sense of known security for the organization. Firewall characteristics are generally the same from firewall brand or vendor to another in that they provide authorized access only into a network. This review will look into the common security features that are present within firewalls and how they are used in daily functions to help prevent issues that threaten organizations. Firewalls work by preventingRead MoreData Processing Systems And Storage1371 Words   |  6 Pages Information Security refers to the characteristics and conditions of data processing systems and storage, to ensure confidentiality, integrity and availability. Consider security aspects means a) know the danger, b) classify and c) protected from impacts or damage in the best way possible. This means that only when we are aware of potential threats, aggressors and their harmful intentions (direct or indirect) against us, we can take appropriate protective measures so that it is not lost or damagedRead MoreConfidentiality Conserve Delegated Access Control Of Public Clouds Essay1654 Words   |  7 Pagesa rising figuring innovation. It allows clients; store their information, learning or data remotely. The reason for this paper is to secure access control plan for open mists. We display a Security Preserving Two Layer Encryption Access control in Public Clouds, which gives more securit y and protection as contrast with the custom approaches. Current ways to deal with uphold access administration polices (ACPs) on outsourced information utilizing chose encryption oblige associations to deals withRead MoreRunning Head : Cloud Computing1042 Words   |  5 Pages When on one hand it has many advantages, including effective management and proper distribution of information over the internet, it can turn out to be disastrous as well. It adds to organization’s technical environment (Deloitte CIO Journal, 2013) and downfall of it will have serious adverse effects on the entire organizational system. This research report will present definite characteristics of organizations that are more likely to use cloud computing than other organizations. We will be discussing

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.