Basic principles of information security - availability, Other Subject

Assignment Help:

Availability

For every information system to provide its reason, the information must be existing when it is desirable. This way that the computing systems used to process and store the information, the safety controls used to guard it, and the communication channels used to access it must be functioning properly. High accessibility systems aim to remain accessible at all times, stopping service disruptions due to hardware failures, power outages, and system upgrades. Ensuring accessibility also involves stopping DoS attacks (denial-of- service attacks).

In 2002, Donn Parker planned an alternative model for the classic CIA triad that he called the six atomic elements of information. The rudiments are authenticity, confidentiality, integrity, possession, availability, and utility. The merits of the Parkerian hexad are a topic of debate in the middle of security professionals.


Related Discussions:- Basic principles of information security - availability

Report on security council resolution, Large protests have been taking plac...

Large protests have been taking place in Libygpt (a state in North Africa) against its oppressive authoritarian leader General Weird Al -dress-sense. The protesters want the Genera

Informal sector, advantages and disadvantages of the informal sector

advantages and disadvantages of the informal sector

Radio interviews, Problem 1 In what ways can radio be a better medium f...

Problem 1 In what ways can radio be a better medium for transmitting messages to an audience? Problem 2 (a) Explain three different types of radio interviews and illust

Ageing and health, Ageing and Health: Ageing, irreversible biological chan...

Ageing and Health: Ageing, irreversible biological changes that occur in all living things with the passage of time eventually result in death. Although all organisms age, rates o

Security governance, SECURIT Y GOVERNANCE The Software Engineering Ins...

SECURIT Y GOVERNANCE The Software Engineering Institute at Carnegie Mellon University, in a publication aristocratic "Governing for Enterprise Security (GES)", describes chara

Credit cards - fits to merchants, FITS TO MERCHANTS An illustration of ...

FITS TO MERCHANTS An illustration of street markets accept credit cards For merchants, a credit card transaction is frequently added more security than other types of paymen

Effective Delivery System, think about a specific healthcare organization: ...

think about a specific healthcare organization: Are there any differences for creating an effective delivery system? Who are the important stakeholders in a healthcare delivery sys

Contemporary feminist thought, Contemporary Feminist Thought: Feminist the...

Contemporary Feminist Thought: Feminist theory is one of the major contemporary sociological theories, which analyzes the status of women and men in society with the purpose of us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd