Security In IT Infrastructure What Essay

A system possesses authenticity when the information retrieved is what is expected by the user -- and that the user is correctly identified and cannot conceal his or her identity. Methods to ensure authenticity include having user names and secure passwords, and even digital certificates and keys that must be used to access the system and to prove that users 'are who they say they are.' Some highly secure workplaces may even use biological 'markings' like fingerprint readers (Introduction, 2011, IBM).

Accountability means that the source of the information is not anonymous and can be traced. A user should not be able to falsify his or her URL address or email address, given the requirements of the system. "Non-repudiation is a property achieved through cryptographic methods which prevents an individual or entity from denying having performed a particular action related to data... Through the use of security-related mechanisms, producers and consumers of data can be assured that the data remains trustworthy across untrusted networks such as the internet, and even internal intranets" (Introduction, 2011, IBM). Non-repudiation...

...

"You are more than used to protecting your home, car and other valuables from any theft or damage," and personal information online is of equal importance (Why is information security important, 2011, Security Extra). In the information age, knowledge is power -- for good or for ill. It can give business a legitimate competitive advantage or it can illegally take away a carefully built credit score when a consumer's identity is stolen.

Sources Used in Documents:

References

Introduction to z/OS Security. (2011). IBM. PowerPoint. Retrieved September 27, 2011 at http://www-03.ibm.com/systems/resources/systems_z_advantages_charter_security_zSecurity_L1_Security_Concepts.ppt

Why is information security important? (2011). Security Extra. Retrieved September 27, 2011 at http://www.securityextra.com/why-is-information-security-important.html


Cite this Document:

"Security In IT Infrastructure What" (2011, September 27) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/security-in-it-infrastructure-what-45829

"Security In IT Infrastructure What" 27 September 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/security-in-it-infrastructure-what-45829>

"Security In IT Infrastructure What", 27 September 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/security-in-it-infrastructure-what-45829

Related Documents

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

The most appropriate products that could be used by MMC to achieve this objective would be: IP San and a Snap Lock. An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide

A security policy is indicated by Harris (2010) to be a set of rules as well as practices that dictates how sensitive information is to be protected, managed as well as distributed while a security model is a mere symbolic representation of the security policy. The following are the security models in use. Lattice Models This security model is based on a mathematical construct that is hugely base don the group

S. To cope with any disaster or unforeseeable eventual attack on the critical infrastructure, to avoid the 9/11 mayhem and lack of organization. Respond; where disaster responsiveness and action at the time of the attack and shortly after is looked into, there is a well laid out proposed plan of how to handle any uneventful eventuality on any of the critical 'node' of the U.S. infrastructure. Lastly recover; which lays out

IT Security Infrastructure IT Security Infrastructure & Its Importance to Physical Security Planning and Infrastructure IT security infrastructure requires a varied number of skills and knowledge to understand how it relates to creation of comprehensive security strategy. Information technology is an important part of physical planning. Risks of cybercrime having gone high, it has become important for information to run securely through cloud. Business have moved to it infrastructure to store up

Tracking normal activity patterns of users is essential to enable abnormal activity to be flagged. Also, unintentional user errors such as logging onto unsecure websites and opening up potentially infected documents must be flagged. Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a