StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Technology Security - Essay Example

Cite this document
Summary
Name: Tutor: Course: Date: University: Information Technology and Security Introduction CIA denotes confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Information Technology Security
Read Text Preview

Extract of sample "Information Technology Security"

Download file to see previous pages

Some of the dominant means of managing confidentiality on systems encompass access control lists, traditional Unix file permissions, and file and volume encryption. Encryption guarantees that only the right people deserving access can read the information (Bidgoli 2006, p.40). Discussion The integrity of information refers to safeguarding information from modification by unauthorized parties and ensuring that the information is complete and authentic. The key to this component entails safeguarding data from adjustment or deletion by unauthorized parties, and guaranteeing that when authorized parties effect changes that should not have been made; the damage rendered can be readily undone (Andress 2011, p.17). In line with data confidentiality, cryptography plays a central function in guaranteeing data integrity.

Some of the dominant methods employed to safeguard data integrity entail hashing the data received and comparing the received data with the original message. Better convenient methods may entail utilization of existing schemes such as GPG to sign the data digitally (Bishop 2004, p.26). Availability of information details ensuring that authorized parties can gain access to the information if need be. . Confidentiality, Integrity and Availability, found in a retail bank with an online banking service In safeguarding data privacy/confidentiality, banks utilize cryptography, which details the art of storing and transmitting confidential information.

Similarly, in guaranteeing assurance of data non-alteration, banks employ digital signatures and hash algorithms to avail data integrity (Calder and Bon 2009, p.4). In pursuit of timely and reliable access to data service for authorized access, banks employ high availability protocols, system hardware devoid of any single points of failure, and fully redundant network architectures to guarantee system reliability and robustness (Sarlak and Hastiani 2011, p.40). Other ways to guarantee information confidentiality encompass enforcing file permissions and access control list to limit access to sensitive information (Bidgoli 2003, p.427). Underlying the objective of confidentiality entails authentication methods such as user-ID and passwords that distinctly highlight a data system’s users, and supporting control methods that restrain each identified user’s access to the data system’s resources.

Confidentiality, Integrity and Availability, found in an online retailer Encryption is widespread in contemporary business environment and manifest in almost every protocol, in use. SSL/TSL details a security protocol for communication over the internet has overtime been employed, in conjunction with a broad range on internet protocols, to guarantee security (Whitman and Mattord 2012, p.501). A second firewall, which remains heavily fortified, connects e-commerce servers. The online retailer can

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/business/1470537-information-technology-security
(Information Technology Security Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/business/1470537-information-technology-security.
“Information Technology Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1470537-information-technology-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology Security

The impact of Compliance on an organisations existing information technology security

One such challenge is the protection and security of data and information crucial to business processes and its overall existence. The research paper tries to explore the importance… Compliance is actually a process and not a destination.... Lastly, the positive impacts of compliance and negatives of non-compliance to IT security has been presented with the help of survey results conducted on major international companies from all sectors.... Executing leadership in agreement with IT security policy and compliance is emerging as a challenge....
20 Pages (5000 words) Research Paper

Information Technology- Security

In the information technology- Security information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources.... Information assurances policies and its goals, mission and objectivesAn organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security....
2 Pages (500 words) Research Paper

IT Security & Sarbanes-Oxley Act

The present term paper "IT security & Sarbanes-Oxley Act" explores the law which derives its name from its sponsors, the then United States Senator Paul Sarbanes and Representative Michael Garver Oxley.... However, it is a fact that Sarbox also provides parameters and mechanics for enhancing IT security.... These scandals, together with their serious effects weakened public confidence in Americas security markets.... ne of the ways the Sarbanes-Oxley Act of 2002 effects and constraints IT security section 404 compliance is by emphasizing a comprehensive understanding of internal controls, as a set of an enterprise's internal procedures, providing reasonable assurances that the enterprise will meet its target in all the specified areas....
5 Pages (1250 words) Term Paper

Analysis of the Problems of XYZ Company

The problem of the company is that their Information Technology Security system is not upgraded as per the market requirement, and the information is not safe.... In order to improve the Information Technology Security system to keep the confidential information of the company in safe hands, it is necessary that the IT security system should be strong enough.... However, the information technology department needs some improvement for that this Yardstick report will provide the solution....
4 Pages (1000 words) Assignment

Information Technology Security Risk

This research will begin with the statement that threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems.... They explore opportunities for security breaches to cause confidential data invasion via unauthorized access, amendment of data, removal of information from information systems.... Vulnerabilities can be distinguished as security loopholes in the system....
13 Pages (3250 words) Research Paper

Information Technology Security Management and Its Impact on Business Success

IntroductionThe current business field has developed to a level where corporate organizations use certain information technology applications to act as a medium of communication, transactions, book keeping and so on.... These are: To produce a report containing the High risk factors involved in IT security management and recommend ways of improvement.... To produce a report containing the high risk factors involved in IT security management and recommend ways of improvement....
12 Pages (3000 words) Thesis

Designing a Secure Network Infrastructure for E-Commerce

Masters in information security management is also meant for gaining specialist qualification in the changing information technology field.... Masters in information security management requires good understanding of the technologies necessary for information security, the technological issues, organizational issues, social issues and the relationship between information technology and other issues mentioned.... For this reason, it is important for a company to develop an information security system....
28 Pages (7000 words) Thesis

Understanding Information Technology Security

"Understanding Information Technology Security" paper focuses on the use of encryption that assures one using either of the operating systems in place of immediate security and protection.... It is important to note that encryption is a mechanism that uses a mathematical formula known as a cipher and a consequent key that is needed for converting readable information that is presented as plain text into data that cannot be comprehended or rather ciphertext (SANS, 2011)....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us