Preview

info security

Better Essays
Open Document
Open Document
2065 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
info security
Student Name: RAIHANA TABASSUM KHAN NATASHA

Student No.: 11535347

Subject Code: ITC 595

Subject Name: INFORMATION SECURITY

Assessment No.: 02

Lecturer: NECTAR COSTADOPOULOS

Assessment due date: 06/04/14

Date Assessment submitted: 06/04/14

Table of contents:

Contents

Answer 1:
Confidentiality:
Confidentiality refers to the information should be secret for the person except the authorized person. If information is confidential attacks cannot steal or copy the information. Confidentiality is much more valuable in passwords and cryptographic keys. It is a shield contrary to unapproved person.
Hacking is a failure of confidentiality. In 2013 LivingSocial stated that their system was hacked which was an unauthorized access. This affected more than fifty millions of their users. User name, email, password, date of birth everything were stolen. This was a failure of confidentiality.(Scmagazine.com,2014) Integrity:
Integrity mainly refers to the honesty, source, and inclusiveness of information and also it blocks wrong and unauthorized alteration of information. It maintains and makes sure that the information is accurate and constant. It has to be same from the source to the recipient.
As an example, the source code of software can be altered to open the security holes on users end before releasing to the open. (Cs.uic.edu,2014)
Availability:
Availability is information being available when an authorized person has requested the information.
As an example we can mention Denial of service (DOS), where the person who is attacking tries to block out the authorized person from using the system totally or nearly being unusable. Normally he overflows the system with unusable information because a system can process definite number of request. If the system is overflowed it can’t process the authorized persons request and it will eventually go into liquidation rejecting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Integrity is almost a given in relation to the job of accounting. Integrity requires accountants to be candid and forthright with client’s financial information. They should use integrity to avoid personal or monetary gain when dealing with confidential information. Without integrity, accountants would not be as highly valued as they…

    • 571 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4222-201 Essay

    • 1063 Words
    • 5 Pages

    Confidentiality means keeping personal information safe, so that electronic and written information cannot be accessed by anyone that doesn’t need to see it. Also not sharing someone's information without their prior consent. This is covered by the Data Protection Act 1998.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Integrity is a key element in the AICPA Code. Integrity requires every member to remain honest and true to the need of client confidentiality. The integrity principle forces each member to look at his or herself and determine if his or her actions and decisions are right or wrong and portray the spirit of technical and ethical standards. As stated in section 54 of the AICPA Code, “integrity is the quality for which the public’s trust derives and the benchmark against which a member ultimately must test his or her decisions” (AICPA, 2012, pg. 1).…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    EST1 Task 2

    • 1120 Words
    • 4 Pages

    Integrity- We will always do what we say and say what we do. We must always be consistent, credible and act with integrity. Employee’s actions should maintain high integrity in all activity related to this organization.…

    • 1120 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Confidentiality means not sharing information about individuals without their knowledge and agreement and ensuring that written and electronic information cannot be accessed or read by people who have no reason to see it.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Thank you for your letter! I can go to Japan to work, I feel very excited but there are a lot of aspects to worry about. Next, I will tell you frankly. And thank you gave me good advice and experience, which is very helpful for me.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Value and Integrity

    • 1315 Words
    • 6 Pages

    Merriam-Webster dictionary defines integrity as, firm adherence to a code of especially moral or artistic values: incorruptibility; the quality…

    • 1315 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Integrity first refers to a willingness to do what is right, even when no one is looking (USAF, 1997). Integrity also means optimizing your job tasks and assisting coworkers in optimizing their job tasks. For a manager, integrity is motivating your team so that they understand the importance of their job so that they are willing to do their jobs, even when you are not looking.…

    • 1101 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Steep Analysis

    • 810 Words
    • 4 Pages

    Hackers can jeopardize the company by acquiring information about it and selling it to its…

    • 810 Words
    • 4 Pages
    Good Essays