Goals of computer security

Assignment Help Computer Network Security
Reference no: EM13926937

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability. All extranets also require authentication methods and, often, confidentiality. Other extranets require that all six goals be reached. Those goals are:

Confidentiality:

When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors' offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering.

Reference no: EM13926937

Questions Cloud

Developing a security evaluation process : You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development.
Find an article about a crime : In this assignment, you will apply the theories you have studied to a particular crime. Conduct an Internet search and find an article about a crime in which you are interested ( I choose Mass Shooting Murder) Crime stories are in the news every d..
Differences in customs, social norms and attitudes : Typically, shares of stock are stored in the vault of the brokerage firm and you, as owner, will not take physical possession.
Independent t test exercises : The hypothesis being tested is: Women who are working will have a lower level of depression as compared to women who are not working. Using Polit2SetC SPSS dataset, which contains a number of mental health variables, determine if the above hypothesi..
Goals of computer security : Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability.
Identify which ethics theory best matches your approach : How does each theory create a different perspective of the situation, and what impact does this have on your decision? Does one theory work better to identify the ‘right' answer?
Characteristics of the criminal incident : The Crime (Describe the characteristics of the criminal incident you found, then describe what we know about this type of crime more generally. . . prevalence, trends, costs, etc.)
Defined as for the third proof of halls theorem : Let M be a matching in a bipartite graph G.Derive the marriage theorem from Konig’s theorem.Let G and H be defined as for the third proof of Halls theorem.
Anxiety usually interferes with performance : Some anxiety is probably healthy; it means you want to do a good job. But too much anxiety usually interferes with performance. Here are some tips you may want to consider as you plan and create your course project.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?

  Computer ethics

CHECK OUT COMPUTER ETHICS INSTITUTE'S ADVICE. The Computer Ethics Institutes Web site at www.cpsr.org/program/ethics/cei.html offers the "Ten Commandments of Computer Ethics" to guide you in the general direction of ethical computer use.

  Evaluate an organization''s security policies

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  Assignment on network security

the selection of a virtual private network (VPN) for a midsize network.You shall actually identify the hardware and software needed to meet the network security and users requirements.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Why people participate in bug bounties

What are the core components of a PKI - Explain the problems with key management.

  Create a communication medium

Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Common information security threats

This is part one of a three-part assignment. The final version will be submitted. It is expected that adjustments will be made in the final version based on the feedback provided .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd