Security Principles

Topics: Transport Layer Security, Computer security, Security Pages: 3 (682 words) Published: December 10, 2012
Security Principles
CMGT/441
November 21, 2012

Security Principles
The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles of IT Seurity, 2012). Ensure the physical security of the data and telecommunications centers and resources. By regulate authorized access to resources through security measures such as user IDs, passwords, and digital certificates. Also by implement auditable authorization processes that adhere to policies provide security awareness training and resources. Keep the Security Department informed of any system/data custodian issues concerning access rules and security violations. The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Web Security Life Cycle Essay
  • Information Systems Security and Control Essay
  • Report on E-Commerce Security Essay
  • Essay about Multi-layered security Plan
  • Essay about It Infrastructure Security Policy
  • Risk management
  • Security Risk Associated with Mobile Devices Essay
  • Internet Security Essay

Become a StudyMode Member

Sign Up - It's Free