Pesante 2008 , There Are Three Basic Security Essay

PAGES
3
WORDS
1281
Cite

¶ … Pesante (2008), there are three basic security threat parameters important to information on the Internet: "confidentiality," "integrity," and "availability." In addition, Pesante addresses three particular concepts that are related to the people to whom information is made available to who need this information for their work in the organization and can be trusted with it: "authentication," "authorization" and "non-repudiation." I think that it is very important to high or very high security requirements in all six areas. Companies should take advantage of all existing opportunities, both in the technical and the non-technical, social / personal area to ensure the highest possible level of information security within their organization. Whereas technical mechanisms are primarily needed to reduce risks resulting from an attack external to the organization, social and personal counter-measures need to be implemented, if the primary source of attack is expected to be internal (see Boran. 1999, p. 6). Confidentiality: A loss of confidentiality occurs when information is read or copied by someone not authorized to do so. Not only the banking and loan and debt collection business but also in the area of research data, medical and insurance records, corporate investment strategies, and related spheres (see Pesante, p. 1). I consider identification and authentication procedures, access control, secure information exchange and reliability of premier countermeasures against loss of confidentiality. When users or programs communicate with each other, the two parties should need to verify each other's identity, so that they know who they are communicating with. The information transmitted to each other should strictly adhere to expected levels of authenticity, confidentiality and non-repudiation. (See Boran, p. 6).

Integrity: Integrity is of particular importance for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial account. In order to prevent a loss of integrity, i.e., unauthorized changes made to information, whether by human error or intent, companies should ensure that a secure network is available. I n order to...

...

). Implementation of accountability and audit trail measures might work very well in this context. Companies need to know who did what, when and where. Under such security measures, users would be responsible and accountable for their actions. Automatic audit trail monitoring and analysis would help to detect security breaches (see Boran, p. 6). I would also recommend the implementation of measures for social/personal interface. For example, organizational roles, responsibility and procedures are required to insure that policies are implemented. Furthermore, companies should implement a security policy that serves as a preventive mechanism for protecting important company data and processes (see Boran, p. 6). A security policy serves as an invaluable tool to communicate a coherent security standard to users, management and technical staff. Such a system should include: information security education of users, managers and system administrators, tools enabling users to implement that policy, strong safeguards, such as passwords and screen locks, person authentication measures, inquisitiveness, monitoring/auditing.
Availability: A loss of availability refers to a situation where people in an organization who are authorized to get information cannot get what they need. Availability is of particular importance in service-oriented businesses depending on information, such as for example, airlines and online inventory systems (see Pesante, p. 1). In order to make sure that information and services are available when needed, companies may implement coordinated counter-measures such as: physical security (access control, secure destruction of media, resource isolation). Companies should make sure that reliability measures (backups, redundancy, hot spares, clusters, RAID, maintenance contracts, off-site duplicates, contingency planning) are in place (see Boran, p. 5).

Authentication: Authentication means the act of proving that a user is the person he or she claims to be (Pesante, p. 2). Organizations can use a…

Sources Used in Documents:

References

Boran, S. 1999. An overview of corporate information security. Combining organisational, physical & it security. PP. 1-9. www.boran.com/security/sp/security_space.html.

Pesante, L. 2008. Introduction to information security. PP. 1 -- 3. www.us-cert.gov/reading_room/infosecuritybasics.pdf.

Information technology protection manual published by the German Federal Office for Information Security. 2011. BSI TR-03127 - Architecture electronic identity card and electronic resident permit (informative translation) (pdf, 1,03 MB). PP. 1 -- 39. www.bsi.bund.de/gshb/english/menue.htm


Cite this Document:

"Pesante 2008 There Are Three Basic Security" (2011, April 23) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/pesante-2008-there-are-three-basic-security-50625

"Pesante 2008 There Are Three Basic Security" 23 April 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/pesante-2008-there-are-three-basic-security-50625>

"Pesante 2008 There Are Three Basic Security", 23 April 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/pesante-2008-there-are-three-basic-security-50625

Related Documents

Moreover, not all states have shield laws. The states that do have such laws are Alabama, Alaska, Arizona, Arkansas, California, Colorado, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Maryland, Michigan, Minnesota, Montana, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, Tennessee, and the District of Columbia. Each of these states defines and applies a journalist's privilege differently.

C). AAPC Code of Ethics is shorter compared to ACA's, centering more on specific issues such as confidentiality and professional practices, among others. Identified as Principle IV in the AAPC code of ethics, Confidentiality is synonymously identified as 'respect for the integrity and protection of the welfare' of its clients, a claim that is similar to ACA's stance on confidentiality. ACA and AAPC discussed the issue of confidentiality similarly, although AAPC

Concomitantly, the patient should also be kept informed of such actions, as it directly affects his or her confidentiality status. The physician should then advise the patient regarding the necessary actions or allowance to be made for the destruction of the records. 6. As mentioned above, it is absolutely vital to identify individuals and organizations with access to the databases containing his or her medical records. The reason for this

Question Three The most important thing that a police psychologist should do when evaluating an officer for a position on the SWAT team is to inform that individual that the information that the officer reveals to the psychologist (and any conclusions that the psychologist comes to) will be shared with the officer's superiors for the purpose of determining if the officer can join the SWAT team. The psychologist is bound to

The client is then hesitant to sue over a breach of trust because the client feels bonded to the therapist and does not want to hurt the therapist by suing. Another issue with confidentiality breaching is that the client has revealed secrets to the therapist and may be concerned that a lawsuit will cause those secrets to become part of public record or be testified about on the stand (Grabois,

Confidentiality Breaches in Clinical Practice The confidentiality and privacy of patients are considered as one of the fundamental freedoms that they should enjoy and are safeguarded under Health Insurance Portability and Accountability Act of 1996 (HIPPA). It is also a precept of the American Medical Association’s Code of Ethics and the Hippocratic Oath. The breach of confidentiality is unethical and illegal. Medical professionals are under the obligation of protecting the patient’s confidentiality.