Balancing security and access-information security, Computer Network Security

BALANCING SECURITY AND ACCESS

Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should be taken as balance between the protection and availability. To achieve balance, level of security should allow reasonable access, yet protect against threats. Figure given below illustrates the basic idea of balancing between security and access of information system.

 

 

              2249_BALANCING SECURITY AND ACCESS-Information security.png

 

                                                             Figure--Balancing Security and Access

Posted Date: 10/8/2012 4:44:31 AM | Location : United States







Related Discussions:- Balancing security and access-information security, Assignment Help, Ask Question on Balancing security and access-information security, Get Answer, Expert's Help, Balancing security and access-information security Discussions

Write discussion on Balancing security and access-information security
Your posts are moderated
Related Questions
CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi