There are various benefits related with providing the security. They are given below,
(i) Confidentiality/ Privacy
(iii) Availability (iv)Authentication. (i) Privacy
Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.
(ii) Integrity has following sub types
(a) Hardware Integrity
The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.
(b) Software Integrity
Security ensures that the system software free from any of the illegitimate alterations, damages etc.
(c) Data Integrity
Security also ensures that data files are secured from the unauthorized access thereby availability, privacy and integrity is maintained.
(d) Network Integrity
Security mechanisms also prevent the network from theactive and passive attacks.
(iii). Resource Availability
Security also ensures that the computer resources are available only to the legitimate and the authorized users.
Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.
Disadvantages/Cons of Providing Security:
Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,
(i) It quite Expensive
(ii) It is very much Time consuming
(iii) Additional resource utilization are required in this
(iv) Increased employee count are required in this.
Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.
(ii) Time Consuming
Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.
(iii) Additional Resource Utilization
The implementation of the security mechanisms includes utilization of the additional bandwidth, memory space, hardware and software for storing, downloading exchanging and implementing the encryption/decryption procedures.
(iv) Increased Employee/Staff Count
Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.