¶ … Pesante (2008), there are three basic security threat parameters important to information on the Internet: "confidentiality," "integrity," and "availability." In addition, Pesante addresses three particular concepts that are related to the people to whom information is made available to who need this information for their work in the organization and can be trusted with it: "authentication," "authorization" and "non-repudiation." I think that it is very important to high or very high security requirements in all six areas. Companies should take advantage of all existing opportunities, both in the technical and the non-technical, social / personal area to ensure the highest possible level of information security within their organization. Whereas technical mechanisms are primarily needed to reduce risks resulting from an attack external to the organization, social and personal counter-measures need to be implemented, if the primary source of attack is expected to be internal (see Boran. 1999, p. 6).
Confidentiality: A loss of confidentiality occurs when information is read or copied by someone not authorized to do so. Not only the banking and loan and debt collection business but also in the area of research data, medical and insurance records, corporate investment strategies, and related spheres (see Pesante, p. 1). I consider identification and authentication procedures, access control, secure information exchange and reliability of premier countermeasures against loss of confidentiality. When users or programs communicate with each other, the two parties should need to verify each other's identity, so that they know who they are communicating with. The information transmitted to each other should strictly adhere to expected levels of authenticity, confidentiality and non-repudiation. (See Boran, p. 6).
Integrity: Integrity is of particular importance for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial account. In order to prevent a loss of integrity, i.e., unauthorized changes made to information, whether by human error or intent, companies should ensure that a secure network is available. I n order to...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now