Basic principles of information security - availability, Other Subject

Availability

For every information system to provide its reason, the information must be existing when it is desirable. This way that the computing systems used to process and store the information, the safety controls used to guard it, and the communication channels used to access it must be functioning properly. High accessibility systems aim to remain accessible at all times, stopping service disruptions due to hardware failures, power outages, and system upgrades. Ensuring accessibility also involves stopping DoS attacks (denial-of- service attacks).

In 2002, Donn Parker planned an alternative model for the classic CIA triad that he called the six atomic elements of information. The rudiments are authenticity, confidentiality, integrity, possession, availability, and utility. The merits of the Parkerian hexad are a topic of debate in the middle of security professionals.

Posted Date: 10/13/2012 2:19:56 AM | Location : United States







Related Discussions:- Basic principles of information security - availability, Assignment Help, Ask Question on Basic principles of information security - availability, Get Answer, Expert's Help, Basic principles of information security - availability Discussions

Write discussion on Basic principles of information security - availability
Your posts are moderated
Related Questions
Write a 3-5 page research paper exploring 3-5 topics regarding global efforts in the information systems industry. The paper needs to clearly identify the global topics, how it''s

assignment on platehelminthes proper described n with examples description nimages

Describe the factors which decide the broad area of Scientific activity?

Romanticism: Conversely, the art from the Romanticism movement was based on emotion rather than rationale, and placed an emphasis on the individual rather than on society. These w

how precise is being made?

what are the objectives of selection and recruitment process

implement full subtractor using demultiplexer

#i submitted my assignment for research skills in Cardiff university but i didnt pass. what i need is an expert to see the feedback of my assignment and edit it according their req

Outline the development and progression of reconciliation, Other Subjec

Does the experts have any knowledge with MIS and security issues