Friday, June 14, 2019

Information Technology Security Essay Example | Topics and Well Written Essays - 750 words

Information Technology Security - Essay ExampleSome of the preponderating means of managing confidentiality on systems encompass glide slope control lists, traditional Unix file permissions, and file and volume encryption. Encryption guarantees that only the right people deserving access can read the information (Bidgoli 2006, p.40). Discussion The impartiality of information refers to safeguarding information from modification by unauthorized parties and ensuring that the information is complete and authentic. The key to this component entails safeguarding data from adjustment or deletion by unauthorized parties, and guaranteeing that when authorized parties effect changes that should not have been made the damage rendered can be readily reverse (Andress 2011, p.17). In line with data confidentiality, cryptography plays a central function in guaranteeing data integrity. Some of the dominant methods worked to safeguard data integrity entail hashing the data received and compar ing the received data with the original message. Better convenient methods may entail utilization of existing schemes such as GPG to sign the data digitally (Bishop 2004, p.26). Availability of information details ensuring that authorized parties can gain access to the information if need be. ... Confidentiality, Integrity and Availability, found in a retail bank with an online banking service In safeguarding data privacy/confidentiality, banks utilize cryptography, which details the art of storing and transmitting confidential information. Similarly, in guaranteeing assurance of data non-alteration, banks employ digital signatures and hash algorithms to avail data integrity (Calder and Bon 2009, p.4). In pursuit of timely and reliable access to data service for authorized access, banks employ high availability protocols, system hardware devoid of any single points of failure, and fully redundant network architectures to guarantee system reliability and robustness (Sarlak and Hastia ni 2011, p.40). early(a) ways to guarantee information confidentiality encompass enforcing file permissions and access control list to limit access to sensitive information (Bidgoli 2003, p.427). Underlying the objective of confidentiality entails credential methods such as user-ID and passwords that distinctly highlight a data systems users, and supporting control methods that restrain each identified users access to the data systems resources. Confidentiality, Integrity and Availability, found in an online retailer Encryption is widespread in contemporary business environment and unadorned in almost every protocol, in use. SSL/TSL details a security protocol for communication over the internet has overtime been employed, in conjunction with a broad range on internet protocols, to guarantee security (Whitman and Mattord 2012, p.501). A second firewall, which remains heavily fortified, connects e-commerce servers. The online retailer can

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.