Balancing security and access-information security, Computer Network Security

BALANCING SECURITY AND ACCESS

Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should be taken as balance between the protection and availability. To achieve balance, level of security should allow reasonable access, yet protect against threats. Figure given below illustrates the basic idea of balancing between security and access of information system.

 

 

              2249_BALANCING SECURITY AND ACCESS-Information security.png

 

                                                             Figure--Balancing Security and Access

Posted Date: 10/8/2012 4:44:31 AM | Location : United States







Related Discussions:- Balancing security and access-information security, Assignment Help, Ask Question on Balancing security and access-information security, Get Answer, Expert's Help, Balancing security and access-information security Discussions

Write discussion on Balancing security and access-information security
Your posts are moderated
Related Questions
CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?