Balancing security and access-information security, Computer Network Security

BALANCING SECURITY AND ACCESS

Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should be taken as balance between the protection and availability. To achieve balance, level of security should allow reasonable access, yet protect against threats. Figure given below illustrates the basic idea of balancing between security and access of information system.

 

 

              2249_BALANCING SECURITY AND ACCESS-Information security.png

 

                                                             Figure--Balancing Security and Access

Posted Date: 10/8/2012 4:44:31 AM | Location : United States







Related Discussions:- Balancing security and access-information security, Assignment Help, Ask Question on Balancing security and access-information security, Get Answer, Expert's Help, Balancing security and access-information security Discussions

Write discussion on Balancing security and access-information security
Your posts are moderated
Related Questions
Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff