StudentShare solutions
Triangle menu

Systematic Security Management - Essay Example

Not dowloaded yet

Extract of sample
Systematic Security Management

information should retain its integrity both with time as well as user at that particular instance of time.
Exposure to corruption, un-monitored changes and destructions disrupt the information to a corrupted or unauthentic state. Information can be corrupted while compilation or storage but in most of the cases it happens while transmission.
Availability of information is that it is available for all the users at all the times, so that it can be reached by everyone and is received in an integral form. It also takes into context the positive as well as negative users of the information.
This characteristic of information makes the information usability possible only for the purposes known to the data owner. Information is not protected from observation, it can be seen by everyone but it is usable only in the ways known to the author.
Information systems have a basic characteristic of identification of the information requester. A system has this characteristic when it can identify the individual user while user sends the request for the information.
When the process of identification and authentication is completed, it is checked that the requesting user has the authorization to the requested context and has been provided the authorization permissions from the proper authority.
As if information is not confidential, a lot of important b...
Users can be a person, a group, an organization or another computer system or any web applications.

Availability does not mean the public and open availability of information to the whole world but only to authentic and authorized users.

Privacy:

This characteristic of information makes the information usability possible only for the purposes known to the data owner. Information is not protected from observation, it can be seen by everyone but it is usable only in the ways known to the author.

Identification:

Information systems have a basic characteristic of identification of the information requester. A system has this characteristic when it can identify the individual user while user sends the request for the information.

Authorization of an individual to the system depends upon identification and authentication of the user.

Identification is the process of noticing the user from his credentials, that whether this user exists or not.


Authentication:

When identification of the user has been done, then the next process is authentication. In identification, system has got the identity of requesting user.

Now here his identity is checked whether this is an authentic user to the system or not by making sure that the same identity is present in the user's profile of the system.

Authorization:

When the process of identification and authentication is completed, it is checked that the requesting user has the authorization to the requested context and has been provided the authorization permissions from the proper authority.

User should have been provided with specific and explicit authorization to access the information ...Show more

Summary

Users are not restricted to access the information but its value is only to the right user. It is like, letting the users as well as general public access the same information but by changing its context and usage subjectively, it may have different meaning to different people.
Author : svolkman
Systematic Security Management essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Systematic Security Management"
with a personal 20% discount.
Grab the best paper

Related Essays

The Information Technology in Business Organizations
The first section provides a brief but succinct overview of the company under consideration. This section aims to introduce the organization, its history and main work focus. This section provides details about the organization's goals and objectives, mission statement and strategies to achieve those goals.
11 pages (2750 words) Essay
Systematic Risk
“Systematic financial risk refers to an event (shock ) which triggers a loss of economic value or confidence in, and attendant increases in uncertainty about a substantial portion of the financial system that is large enough to, in all probability have an adverse effect on the real economy” (De Nicolo and Kwast, 2002: 4).
12 pages (3000 words) Essay
Security Management
The protection program can be executed against intrusion, trespass, acts of violence, theft, or fire. The principal purpose of the security management is the development and implementation of procedures, policies, standards, training, and methods for identifying and protecting information, personnel, facilities, property, operations, or material from unauthorized misuse, disclosure, assault, theft, espionage, vandalism, sabotage, or loss.
14 pages (3500 words) Essay
Security assignment IT
Rights on changing the information are provided only to the user having authentic means to reach the information and proper authorized identity which is disclosed to the information cluster by the user and information is updated by user. Integrity also pertains to the
6 pages (1500 words) Essay
Computer security and risk management
e future of a business, the management needs to know all the known and emerging threats to the business and take timely corrective as well as preventive actions. This approach requires that a structured, analytical and effective Risk Management Process should be in place
11 pages (2750 words) Essay
Security Management (
Also to add to the authenticity of the control, measures to sustain any kind of known or unknown incident have been mentioned along the course of the report. Special emphasis on the VIPs
7 pages (1750 words) Essay
Security Analysis and Portfolio Management
right stock or security (in terms of value and profitability) to purchase and the management of the investment have always been impediment to extensive investment. In order to overcome such impediments, financial experts or security analysts involve in security analysis with
7 pages (1750 words) Essay
Security Management
vate security services that have experienced high growth in demand include guarding, armored transport, pre-employment screening, security consulting, private investigations, and alarm monitoring. McCrie (2007) assert that the security director will collect and analyze
3 pages (750 words) Essay
Information security management (small mail company) smaller to Aramex mail company in UAE
The company interfaces with other international couriers to a great extent. It has been providing services that are specifically aimed at filling the existing gap between freight carriers and national packages, as well as unpredictable and local delivery services.
40 pages (10000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation