Balancing security and access-information security, Computer Network Security

BALANCING SECURITY AND ACCESS

Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should be taken as balance between the protection and availability. To achieve balance, level of security should allow reasonable access, yet protect against threats. Figure given below illustrates the basic idea of balancing between security and access of information system.

 

 

              2249_BALANCING SECURITY AND ACCESS-Information security.png

 

                                                             Figure--Balancing Security and Access

Posted Date: 10/8/2012 4:44:31 AM | Location : United States







Related Discussions:- Balancing security and access-information security, Assignment Help, Ask Question on Balancing security and access-information security, Get Answer, Expert's Help, Balancing security and access-information security Discussions

Write discussion on Balancing security and access-information security
Your posts are moderated
Related Questions
Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo