Goals of computer security

Assignment Help Computer Network Security
Reference no: EM13926937

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability. All extranets also require authentication methods and, often, confidentiality. Other extranets require that all six goals be reached. Those goals are:

Confidentiality:

When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors' offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering.

Reference no: EM13926937

Questions Cloud

Developing a security evaluation process : You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development.
Find an article about a crime : In this assignment, you will apply the theories you have studied to a particular crime. Conduct an Internet search and find an article about a crime in which you are interested ( I choose Mass Shooting Murder) Crime stories are in the news every d..
Differences in customs, social norms and attitudes : Typically, shares of stock are stored in the vault of the brokerage firm and you, as owner, will not take physical possession.
Independent t test exercises : The hypothesis being tested is: Women who are working will have a lower level of depression as compared to women who are not working. Using Polit2SetC SPSS dataset, which contains a number of mental health variables, determine if the above hypothesi..
Goals of computer security : Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability.
Identify which ethics theory best matches your approach : How does each theory create a different perspective of the situation, and what impact does this have on your decision? Does one theory work better to identify the ‘right' answer?
Characteristics of the criminal incident : The Crime (Describe the characteristics of the criminal incident you found, then describe what we know about this type of crime more generally. . . prevalence, trends, costs, etc.)
Defined as for the third proof of halls theorem : Let M be a matching in a bipartite graph G.Derive the marriage theorem from Konig’s theorem.Let G and H be defined as for the third proof of Halls theorem.
Anxiety usually interferes with performance : Some anxiety is probably healthy; it means you want to do a good job. But too much anxiety usually interferes with performance. Here are some tips you may want to consider as you plan and create your course project.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why is cryptology important in information security

Why is cryptology important in information security. What would be the implications of not using cryptographic technologies. Why might vendors propose proprietary encryption methods. Why is this suspect

  Describe the relevant technologies

Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)

  Department of homeland securitys mission

Interpret the Department of Homeland Security's mission, operations and responsibilities. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets

  What security functions are typically outsourced

What security functions are typically outsourced?

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  Explain decryption speed

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Apply division method to calculate hash value of character

How can we apply division method to calculate hash value of character string without using more than constant number of words of storage outside string itself?

  Do viruses infect hardware and executable files

Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security.

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Describe a remote access control policy

In a two- to three-page essay, design and describe a remote access control policy that details the requirements for establishing secure access between remote offices located in Atlanta, San Francisco, Chicago, and Dallas. In order to communicate b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd