Balancing security and access-information security, Computer Network Security

BALANCING SECURITY AND ACCESS

Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should be taken as balance between the protection and availability. To achieve balance, level of security should allow reasonable access, yet protect against threats. Figure given below illustrates the basic idea of balancing between security and access of information system.

 

 

              2249_BALANCING SECURITY AND ACCESS-Information security.png

 

                                                             Figure--Balancing Security and Access

Posted Date: 10/8/2012 4:44:31 AM | Location : United States







Related Discussions:- Balancing security and access-information security, Assignment Help, Ask Question on Balancing security and access-information security, Get Answer, Expert's Help, Balancing security and access-information security Discussions

Write discussion on Balancing security and access-information security
Your posts are moderated
Related Questions
This assignment aims to enhance students' understanding of the network protocol hierarchy and flow control and error control techniques by implementing a sliding window protocol in

What are the main differences between TCP/IP vs OSI?

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Explain the architecture of ISDN.....?


Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co