Preview

Ethics

Better Essays
Open Document
Open Document
1702 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
1. List the three fundamental security properties and for each give an example of a failure.

CIA is a commonly used standard for information systems security, concentrating on the 3 core goals of confidentiality, integrity and availability of information in the system.
When every time IT team installs a software or a sever, they never forget to analyse the data transport methods, data base, how they provide access for users according to the CIA standards.
Those three fundamental security properties are: 1) Confidentiality Confidentiality is limiting the information access for the users in the system. IT administrator need to identify to which users he should give access rights and which users he shouldn’t give or control. Methods like User identification number and password are commonly used techniques. Although these techniques can prevent unauthorised access you can’t guarantee it is 100% reliable. Confidentiality can be breached due to these factors: Information sharing Carelessness of users. Unsecure document storage
In contrast in real life, students log in to university systems by using their user id and pass words. When they leave they should log off their accounts. But sometimes because of their carelessness they forget to do than and leave that as it is. So when situations like that anyone can use their login and do anything they want. (University of Miami, 1997-2008) 2) Integrity
Integrity is the reliability of information resources. Main concentration is data has not been changed or modified during the communication process. It is very important that the user get exact information which came out from the database or whatever the resources. But yet again there is a possibility that integrity can be break.eg: When a user tries to do online transaction, pay pal or net bank web site might appear as same as the original one interface might be same. But the web address or data base can be a fake one. In that case users can get



References: University of Miami. (1997-2008).Confidentiality, Integrity and Availability (CIA). Retrieved Jan 28, 2013 from http://it.med.miami.edu/x904.xml Benzel.T.V, Irvine.C.E, Levin.T.E, Bhaskara.G, Nguyen.T.D Daswani.N, Kern.C, & Kesavan.A. (2007). Secure Design Principles Retrieved Jan 28, 2013, from http://www.developer.com/java/web/article.php/3667601/Secure-Design-Principles.htm Meunier.P (2008) Confusion of Separation of Privilege and Least Privilege Retrieved Jan 28, 2013 from http://www.cerias.purdue.edu/site/blog/post/confusion-of-separation-of-privilege-and-least-privilege/ Kantarcioglu.M (n.d.) fearless engineering. Ut Dallass: Erik Jonsson School of engineering & computer science Seebach.P (2008) The stateless state retrieved Jan 28, 2013 Retrieved Jan 30, 2013 from http://www.alliancedatacom.com/how-vpn-works.asp

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Security Principles 3. Threats, Vulnerabilities, Control Measures and Information Assurance 4. Achieving Information Security: Administrative, Physical, Technical Safeguards Security is achieved by addressing its components: confidentiality, integrity, availability and accountability. 1. Confidentiality is the property that data or information is not made available or disclosed to unauthorized persons or processes.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Database Exam Paper

    • 4799 Words
    • 20 Pages

    7) Patient allergy information is an example of an asset with a moderate requirement for integrity. 8) The more critical a component or service, the higher the level of availability required. 9) Data origin authentication provides protection against the duplication or modification of data units. 10) The emphasis in dealing with passive attacks is on prevention rather than detection. 11) Data integrity is the protection of data from unauthorized disclosure. 12) Information access threats exploit service flaws in computers to inhibit use by legitimate users. 13) Viruses and worms are two examples of software attacks. 14) A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only. 15) Pervasive security mechanisms are not specific to any particular OSI security service or protocol layer. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 16) _________ security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. A)…

    • 4799 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    ethics

    • 562 Words
    • 3 Pages

    1. The first one is the most powerful lesson learned from practicing ethical conduct during Boisjoly’s 27-year engineering career in the aerospace industry, is that them, as individuals, become the result-ant sum of each ethical confrontational event as experienced from the beginning of their careers.…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ethics

    • 1074 Words
    • 5 Pages

    The focus of this course is the reasoning process used when we are making decisions. Some reasoning processes are for individual decisions, while others are for social decisions. It is important to remember that the course (and these assignments) are NOT about opinions (your own or the expert’s), but rather about the reasoning process used in arriving at these opinions and decisions.…

    • 1074 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Ethics

    • 2384 Words
    • 10 Pages

    A recession is caused by many different factors, not just one. It is the coming together of many different problems, all at one time. Some factors that contributed to this last Great Recession include consumer indebtedness, income inequality, lax regulations and the housing bubble. In this paper we will discuss how the Housing Bubble exacerbated and what is its link to the Great Recession. It is necessary to note that because the bursting continues and because lessons have not been learned from previous recessions, nor this one, the problem may remain for a while, fueling this recession further.…

    • 2384 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Ethics

    • 752 Words
    • 4 Pages

    A 19 year old college student and addicted gambler was pulled over for erratic driving on the Long Island Expressway. He pulled out a toy pistol and pointed it at the officer, he was then shot and killed. Another incident involving a 45 year old cancer patient had the same ending in new Jersey. He walked into a Pizza Shop and pointed a gun at the officers inside eating. Experts believe that they force the cops to kill them as a form of suicide. Suicide is difficult to commit and forcing an officer to kill you takes away the pressure of completing the task. Some insurance companies don’t cover suicide and religions forbid it so it is away of taking the guilt and shame away from common suicide. 10% of fatal police shootings are brought on by people seeking to die.…

    • 752 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ethics

    • 375 Words
    • 2 Pages

    In reading the Ethics problem box regarding the Trolley Problem I will attempt to answer the question of would I throw the switch. I have had the chance to research different profiles to try and answer this question.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics

    • 620 Words
    • 3 Pages

    A married couple, both addicted to drugs, is unable to care for their infant daughter. She is taken from them by court order and placed in a foster home. The years pass. She comes to regard her foster parents as her real parents. They love her as they would their own daughter. When the child is 9 yrs. old, the natural parents, rehabilitated from drugs, begin court action to regain custody. The case is decided in their favor. The child is returned to them, against her will. Does ethic support the law in this case? Discuss…

    • 620 Words
    • 3 Pages
    Good Essays