Preview

Ethics

Better Essays
Open Document
Open Document
1702 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
1. List the three fundamental security properties and for each give an example of a failure.

CIA is a commonly used standard for information systems security, concentrating on the 3 core goals of confidentiality, integrity and availability of information in the system.
When every time IT team installs a software or a sever, they never forget to analyse the data transport methods, data base, how they provide access for users according to the CIA standards.
Those three fundamental security properties are: 1) Confidentiality Confidentiality is limiting the information access for the users in the system. IT administrator need to identify to which users he should give access rights and which users he shouldn’t give or control. Methods like User identification number and password are commonly used techniques. Although these techniques can prevent unauthorised access you can’t guarantee it is 100% reliable. Confidentiality can be breached due to these factors: Information sharing Carelessness of users. Unsecure document storage
In contrast in real life, students log in to university systems by using their user id and pass words. When they leave they should log off their accounts. But sometimes because of their carelessness they forget to do than and leave that as it is. So when situations like that anyone can use their login and do anything they want. (University of Miami, 1997-2008) 2) Integrity
Integrity is the reliability of information resources. Main concentration is data has not been changed or modified during the communication process. It is very important that the user get exact information which came out from the database or whatever the resources. But yet again there is a possibility that integrity can be break.eg: When a user tries to do online transaction, pay pal or net bank web site might appear as same as the original one interface might be same. But the web address or data base can be a fake one. In that case users can get



References: University of Miami. (1997-2008).Confidentiality, Integrity and Availability (CIA). Retrieved Jan 28, 2013 from http://it.med.miami.edu/x904.xml Benzel.T.V, Irvine.C.E, Levin.T.E, Bhaskara.G, Nguyen.T.D Daswani.N, Kern.C, & Kesavan.A. (2007). Secure Design Principles Retrieved Jan 28, 2013, from http://www.developer.com/java/web/article.php/3667601/Secure-Design-Principles.htm Meunier.P (2008) Confusion of Separation of Privilege and Least Privilege Retrieved Jan 28, 2013 from http://www.cerias.purdue.edu/site/blog/post/confusion-of-separation-of-privilege-and-least-privilege/ Kantarcioglu.M (n.d.) fearless engineering. Ut Dallass: Erik Jonsson School of engineering & computer science Seebach.P (2008) The stateless state retrieved Jan 28, 2013 Retrieved Jan 30, 2013 from http://www.alliancedatacom.com/how-vpn-works.asp

You May Also Find These Documents Helpful

  • Good Essays

    Ethics

    • 898 Words
    • 4 Pages

    problem today is that kids are unaware of their moral values and are unable to define what is…

    • 898 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethics

    • 7367 Words
    • 30 Pages

    Session 1 2013 Faculty of Business School of Computing and Mathematics CSU Study Centre Sydney Internal Mode Subject Coordinator Chandana Penatiyana Withanage…

    • 7367 Words
    • 30 Pages
    Powerful Essays
  • Satisfactory Essays

    ethics

    • 562 Words
    • 3 Pages

    1. The first one is the most powerful lesson learned from practicing ethical conduct during Boisjoly’s 27-year engineering career in the aerospace industry, is that them, as individuals, become the result-ant sum of each ethical confrontational event as experienced from the beginning of their careers.…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Ethics

    • 701 Words
    • 3 Pages

    QBank offered Jen a substantial amount of money for the premises of her florist shop. However, this will all come at the cost of her two employees Diane and Helen losing their jobs in the shop. Therefore, it seems Jen faces an ethical dilemma, particularly because she promised her employees that she would keep them on. By looking at key relevant ethical theories a decision can be made that best suits Jens situation.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ethics

    • 403 Words
    • 2 Pages

    Given a description of a specific business enterprise, write a management job description that incorporates the basic activities that comprise the management process and the job of a manager.…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Ethics

    • 314 Words
    • 1 Page

    The pros of occupational licensing are that it protects the public from incompetent providers. Licenses prove to the public that the provider has had the education and/or training. This does not always mean the provider is going to perform a good job. It also promotes higher income for the licensee.…

    • 314 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays