Question

In: Computer Science

1. List and describe the extended characteristics (Six Ps) of information security management.

1. List and describe the extended characteristics (Six Ps) of information security management.

Solutions

Expert Solution

Information security management:

1. Integrity:

Information security assumes a significant function in keeping up the security in various kinds of uncommon conditions, for example, the mistakes of the uprightness. As we realize that data, security is utilized to give the assurance to the documentation or various sorts data present on the organization or in the framework. Along these lines, there are numerous infections that can taint the PC, hinders the working and furthermore break the respectability of the framework. In this manner, data security gives the important and simple strides to forestall the various sorts of mistakes made because of uprightness.

2. Confidentiality:

Confidentiality is the process that is used to protect the information on the network by avoids the unauthorized person to see your information on the networking technology such as internet technology. For example, different types of thieves use different types of methods to steel the confidential information on the internet without the knowledge of the person, such as credit card number and steel all the money. However, the information security plays a vital role in preventing the information from the disclosure and unauthenticated use. In addition, your data remain save from different types identity theft technologies used by the thieves.

3. Authentication

Another significant quality of the information security innovation, that it can give the confirmation strategy to shield the records or the documents from various kinds of programmers and furthermore shield them from contamination of various infections. In verification technique, data security gives the chance to the client that the individual can dole out the various kinds of unique or the mystery word that is called as secret phrase to the necessary data that must be ensured.

4. Availability :

For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial -of- service attacks.

5. Privacy :

The information that is collected, used, and stored by an organization is to be used only for the purposes stated to the data owner at the time it was collected. This definition of privacy does focus on freedom from observation (the meaning usually associated with the word), but rather means that information will be used only in ways known to the person providing it.

6. Identification

An information system possesses the characteristic of identification when it is able to recognize individual users. Identification and authentication are essential to establishing the level of access or authorization that an individual is granted.


Related Solutions

1. List and describe six key activities involved in the destination management process. 2. Describe partnerships...
1. List and describe six key activities involved in the destination management process. 2. Describe partnerships and collaboration relative to the tourism industry. 3. Provide an example of partnerships relative to the tourism industry. 4. Provide an example of collaboration relative to the tourism industry. 5. What are the benefits of Tourism Development in destinations experiencing a decline in economies?
List and describe the six major categories of benefits administered by the Social Security Association.
List and describe the six major categories of benefits administered by the Social Security Association.
The modern enterprise resource management IS provides “core” and “extended” modules. (1) List two core modules...
The modern enterprise resource management IS provides “core” and “extended” modules. (1) List two core modules and two extended ERP modules . (2) What is the fundamental organisational characteristic that differentiates “core” and “extended” modules (1 mark)?
1. List the best practices for a corporate password security policy. 2. List and describe the...
1. List the best practices for a corporate password security policy. 2. List and describe the best practices for a corporate password security policy. 3. List and describe the best practices for a corporate physical security policy. 4. List and describe the best practices for a corporate digital security policy. 5. List and describe the best practices for a corporate printer security policy.
Briefly describe six characteristics of a quality control officer.
Briefly describe six characteristics of a quality control officer.
Principles of Information Security Using about 1000 words List and describe which members of an organisation...
Principles of Information Security Using about 1000 words List and describe which members of an organisation are involved in the security systems development life cycle. Who leads the process?
Describe the characteristics of an effective management accounting report
Describe the characteristics of an effective management accounting report
Qualitative Characteristics The following is a list of qualitative characteristics of useful accounting information identified in...
Qualitative Characteristics The following is a list of qualitative characteristics of useful accounting information identified in FASB's and IASB's Statement of Financial Accounting Concepts No. 8 and statements describing the qualities. A. Comparability B. Decision usefulness C. Relevance D. Faithful representation E. Predictive value F. Confirmatory value G. Verifiability H. Neutrality I. Free from error J. Consistency K. Materiality L. Timeliness M. Understandability N. Completeness Required: Select the appropriate letter identifying each quality on the statement describing the quality. 1....
Distributions: List the characteristics of a normal distribution. The weights of baby boys at six months...
Distributions: List the characteristics of a normal distribution. The weights of baby boys at six months is normally distributed with a mean of 17.25 lbs. and a standard deviation of 2.0 lbs. By an age of twelve months, the mean increases to 22.50 lbs. and the standard deviation is 2.2 lbs. Which age group has the wider distribution? What percentage of the twelve-month old boys weigh more than 26.9 lbs.? What percentage of six-month old boys weigh between 15.25 lbs....
List the characteristics of strategic thinkers and describe why these characteristics are important to successful strategic...
List the characteristics of strategic thinkers and describe why these characteristics are important to successful strategic management? The list of characteristics of strategic thinkers are: having a vision, understanding the business and your clients, external orientation, creatively generating new ideas, propensity for questioning assumptions, understanding the score of the game, knowing that change is inevitable, knowing strategic choices must have focus and forces, knowing the competition, knowing their customers. Why the above-listed characteristics of strategic thinkers are important to successful...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT