Goals of computer security

Assignment Help Computer Network Security
Reference no: EM13926937

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability. All extranets also require authentication methods and, often, confidentiality. Other extranets require that all six goals be reached. Those goals are:


When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors' offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering.

Reference no: EM13926937

Project - prepare a local it security policy

Project: Prepare a Local IT Security Policy- In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security

Perform a risk assessment on your design

Perform a risk assessment on your design and compare it to existing eCash transfer systems - Propose an electronic cash transfer system (similar to Bitcoin) that is completel

Providing security over data

The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of

Search the web for news on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the prob

Explain how the council should protect critical assets

Your role is Security Manager at Ruskin City Council. Your job involves the detection, prevention and reaction to potential and actual security violations. The Head of Secur

Selecting an expert for an expert witness opinion

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.  Research and provide details on the hourly estimates for using t

How do they fit within the situational crime prevention

What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework - how does the current law help or hinder your countermeas

Compare and contrast the features of each product

Analyze and recommend two antivirus solutions that can be used on all 3 operating systems. Compare and contrast the features of each product, and make a recommendation about


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd