In: Computer Science
1. List and describe the extended characteristics (Six Ps) of
information security management.
Information security management:
1. Integrity:
Information security assumes a significant function in keeping up the security in various kinds of uncommon conditions, for example, the mistakes of the uprightness. As we realize that data, security is utilized to give the assurance to the documentation or various sorts data present on the organization or in the framework. Along these lines, there are numerous infections that can taint the PC, hinders the working and furthermore break the respectability of the framework. In this manner, data security gives the important and simple strides to forestall the various sorts of mistakes made because of uprightness.
2. Confidentiality:
Confidentiality is the process that is used to protect the information on the network by avoids the unauthorized person to see your information on the networking technology such as internet technology. For example, different types of thieves use different types of methods to steel the confidential information on the internet without the knowledge of the person, such as credit card number and steel all the money. However, the information security plays a vital role in preventing the information from the disclosure and unauthenticated use. In addition, your data remain save from different types identity theft technologies used by the thieves.
3. Authentication
Another significant quality of the information security innovation, that it can give the confirmation strategy to shield the records or the documents from various kinds of programmers and furthermore shield them from contamination of various infections. In verification technique, data security gives the chance to the client that the individual can dole out the various kinds of unique or the mystery word that is called as secret phrase to the necessary data that must be ensured.
4. Availability :
For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial -of- service attacks.
5. Privacy :
The information that is collected, used, and stored by an organization is to be used only for the purposes stated to the data owner at the time it was collected. This definition of privacy does focus on freedom from observation (the meaning usually associated with the word), but rather means that information will be used only in ways known to the person providing it.
6. Identification
An information system possesses the characteristic of identification when it is able to recognize individual users. Identification and authentication are essential to establishing the level of access or authorization that an individual is granted.