Preview

Information Systems and Security Audit

Better Essays
Open Document
Open Document
1955 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Systems and Security Audit
INFORMATION SYSTEMS AND SECURITY AUDIT

1. Define the following terms: (6 Marks)
-Integrity
In information security, integrity means that data cannot be modified undetectably. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information security systems typically provide message integrity in addition to data confidentiality.

- Confidentiality
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred.

- Non-repudiation
In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.
Electronic commerce uses technology such as digital signatures and public key encryption to establish authenticity and non-repudiation.

2. Describe the function of Record Layer in SSL Architecture (2 Marks)
The SSL Record Protocol provides basic security services to various higher-layer protocols. In particular, the HTTP, which provides the transfer service for Web client/server interaction, can operate on top of SSL. Three higher-layer protocols are defined as part of SSL: the

You May Also Find These Documents Helpful

  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    End user will receive what is sent-guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Security Principles 3. Threats, Vulnerabilities, Control Measures and Information Assurance 4. Achieving Information Security: Administrative, Physical, Technical Safeguards Security is achieved by addressing its components: confidentiality, integrity, availability and accountability. 1. Confidentiality is the property that data or information is not made available or disclosed to unauthorized persons or processes.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Unit 4222-201 Essay

    • 1063 Words
    • 5 Pages

    Confidentiality means keeping personal information safe, so that electronic and written information cannot be accessed by anyone that doesn’t need to see it. Also not sharing someone's information without their prior consent. This is covered by the Data Protection Act 1998.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    nvq level 2

    • 343 Words
    • 2 Pages

    1. Confidentiality means when somebody tells you information that is strict and you are not allowed to tell anybody about and you must keep it to your self.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Confidentiality means not sharing information about individuals without their knowledge and agreement and ensuring that written and electronic information cannot be accessed or read by people who have no reason to see it.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Unit 001 Outcome 1 3 4

    • 265 Words
    • 1 Page

    Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit 1 2 and 3

    • 1651 Words
    • 1 Page

    4.1 Confidentiality means not sharing information about people without their knowledge and agreement, and making sure that written and electronic information cannot be accessed by people who have no reason to see it.…

    • 1651 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Confidentiality is closely interwoven with the concept of privacy. Every individual has the right to privacy. Privacy requires that facts or information which have been shared by someone with another party remain private and are not disclosed without the permission of the person who gave them. Keeping information private and safe, passing on private information with the individual’s permission, only passing on information to others who have a right to it and need to know it.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Audit

    • 356 Words
    • 2 Pages

    When you tested that total gross less total taxes less total deductions equals net pay, were there differences between the Computed_Net and Net_Pay fields? If so, obtain a report of all records where differences exist and explain what is probably causing the differences.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Confidentiality is an important principle in health and social care because it functions to impose a boundary on the amount of personal information and data that can be disclosed without consent. Confidentiality arises where a person disclosing personal information reasonably expects his or her privacy to be protected, such as in a relationship of trust.…

    • 289 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality H+S lvl 2

    • 3984 Words
    • 16 Pages

    Confidentiality means not sharing information about people without their knowledge or consent. It is ensuring that all information stored either on paper or electronically is inaccessible to anyone who does not have permission to access it.…

    • 3984 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Essay On Confidentiality

    • 939 Words
    • 4 Pages

    Confidentiality is the protection of personal information. Confidentiality means keeping a client's information between you and the patient, and not telling others including friends and family. (Learning, n.d.). For example, the information about a child suffering from Cystic Fibrosis should not be disclosed to anyone other than the child and his/her parents.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The mere mention of an "audit" is enough to make anyone nervous. But, put in proper perspective, an audit of IT operational policies and procedures is an effective means of assessing the viability of IT services and functions. An audit will serve its intended purpose if two primary objectives are reached:…

    • 1095 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Security Issues

    • 567 Words
    • 3 Pages

    Confidentiality means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.1 Information confidentiality is a major concern for government, military, financial institutions, hospitals, corporations and private businesses. Data encryption is one of the most used ways to maintain data confidential followed by restricted access. Organizations must carefully chose the information they allow each employee to access in order to be able to maintain their data confidential. Any security breach that compromises any confidential data could cause severe consequences to any organization.…

    • 567 Words
    • 3 Pages
    Good Essays