Retrieved from https://studentshare.org/business/1470537-information-technology-security
https://studentshare.org/business/1470537-information-technology-security.
Some of the dominant means of managing confidentiality on systems encompass access control lists, traditional Unix file permissions, and file and volume encryption. Encryption guarantees that only the right people deserving access can read the information (Bidgoli 2006, p.40). Discussion The integrity of information refers to safeguarding information from modification by unauthorized parties and ensuring that the information is complete and authentic. The key to this component entails safeguarding data from adjustment or deletion by unauthorized parties, and guaranteeing that when authorized parties effect changes that should not have been made; the damage rendered can be readily undone (Andress 2011, p.17). In line with data confidentiality, cryptography plays a central function in guaranteeing data integrity.
Some of the dominant methods employed to safeguard data integrity entail hashing the data received and comparing the received data with the original message. Better convenient methods may entail utilization of existing schemes such as GPG to sign the data digitally (Bishop 2004, p.26). Availability of information details ensuring that authorized parties can gain access to the information if need be. . Confidentiality, Integrity and Availability, found in a retail bank with an online banking service In safeguarding data privacy/confidentiality, banks utilize cryptography, which details the art of storing and transmitting confidential information.
Similarly, in guaranteeing assurance of data non-alteration, banks employ digital signatures and hash algorithms to avail data integrity (Calder and Bon 2009, p.4). In pursuit of timely and reliable access to data service for authorized access, banks employ high availability protocols, system hardware devoid of any single points of failure, and fully redundant network architectures to guarantee system reliability and robustness (Sarlak and Hastiani 2011, p.40). Other ways to guarantee information confidentiality encompass enforcing file permissions and access control list to limit access to sensitive information (Bidgoli 2003, p.427). Underlying the objective of confidentiality entails authentication methods such as user-ID and passwords that distinctly highlight a data system’s users, and supporting control methods that restrain each identified user’s access to the data system’s resources.
Confidentiality, Integrity and Availability, found in an online retailer Encryption is widespread in contemporary business environment and manifest in almost every protocol, in use. SSL/TSL details a security protocol for communication over the internet has overtime been employed, in conjunction with a broad range on internet protocols, to guarantee security (Whitman and Mattord 2012, p.501). A second firewall, which remains heavily fortified, connects e-commerce servers. The online retailer can
...Download file to see next pages Read More