Thursday, May 2, 2019
Information Technology Security Essay Example | Topics and Well Written Essays - 750 words
Information Technology Security - turn out ExampleSome of the dominant means of managing confidentiality on frames encompass access control lists, traditional Unix accommodate permissions, and file and volume encryption. Encryption tackles that only the right people deserving access potentiometer deal the teaching (Bidgoli 2006, p.40). Discussion The integrity of information refers to safeguarding information from modification by unauthorized parties and ensuring that the information is wind up and authentic. The key to this component entails safeguarding info from adjustment or deletion by unauthorized parties, and guaranteeing that when authorized parties achievement changes that should not have been made the damage rendered can be readily undone (Andress 2011, p.17). In specify with info confidentiality, cryptography plays a central function in guaranteeing info integrity. Some of the dominant methods industrious to safeguard data integrity entail hashing the data rec eived and comparing the received data with the genuine message. Better convenient methods may entail utilization of existing schemes such as GPG to sign the data digitally (Bishop 2004, p.26). Availability of information details ensuring that authorized parties can gain access to the information if impoverishment be. ... Confidentiality, Integrity and Availability, found in a retail bank with an online banking service In safeguarding data screen/confidentiality, banks utilize cryptography, which details the art of storing and transmitting confidential information. Similarly, in guaranteeing assurance of data non-alteration, banks employ digital signatures and hash algorithms to avail data integrity (Calder and Bon 2009, p.4). In pursuit of timely and reliable access to data service for authorized access, banks employ high availability protocols, system hardware devoid of any wholeness points of failure, and fully redundant network architectures to guarantee system reliability an d robustness (Sarlak and Hastiani 2011, p.40). Other ways to guarantee information confidentiality encompass enforcing file permissions and access control list to limit access to sensitive information (Bidgoli 2003, p.427). Underlying the objective of confidentiality entails authentication methods such as user-ID and passwords that distinctly highlight a data systems users, and supporting control methods that restrain each identified users access to the data systems resources. Confidentiality, Integrity and Availability, found in an online retailer Encryption is widespread in modern-day business environment and manifest in almost every protocol, in use. SSL/TSL details a shelter protocol for communication over the internet has overtime been employed, in conjunction with a broad clutch on internet protocols, to guarantee security (Whitman and Mattord 2012, p.501). A second firewall, which remains heavily fortified, connects e-commerce servers. The online retailer can
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.