Get your essays here, 33,000 to choose from!

Limited Time Offer at Free College Essays!!!

Security Designs

17 Pages 4143 Words


Research/Study Plans


This paper describes design methods that will help Information security professionals develop a strategy to protect the availability, integrity, and confidentiality of data in an organization's information technology (IT) system. It will be of interest to information resource managers, computer security officials, and administrators, and of particular value to those trying to establish computer security policies. The methodology offers a systematic approach to this important task and, as a final precaution, also involves establishing contingency plans in case of a disaster.
Data in an IT system is at risk from various sources—user errors and malicious and non-malicious attacks. Accidents can occur and attackers can gain access to the system and disrupt services, render systems useless, or alter, delete, or steal information.
An IT system may need protection for one or more of the following aspects of data:
· Confidentiality. The system contains information that requires protection from unauthorized disclosure. Examples: Timed dissemination information (for example, crop report information), personal information, and proprietary business information.
· Integrity. The system contains information that must be protected from unauthorized, unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems.
· Availability. The system contains information or provides services that must be available on a timely basis to meet mission requirements or to avoid substantial losses. Examples: Systems critical to safety, life support, and hurricane forecasting.
Security administrators need to decide how much time, money, and effort needs to be spent in order to develop the appropriate security policies and controls. Each organization should analyze its specific needs and determine its resource and scheduling requirements and constraints. Comput...

Page 1 of 17 Next >

Essays related to Security Designs

Loading...