Preview

Security Principles

Good Essays
Open Document
Open Document
682 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Principles
Security Principles
CMGT/441
November 21, 2012

Security Principles
The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles of IT Seurity, 2012). Ensure the physical security of the data and telecommunications centers and resources. By regulate authorized access to resources through security measures such as user IDs, passwords, and digital certificates. Also by implement auditable authorization processes that adhere to policies provide security awareness training and resources. Keep the Security Department informed of any system/data custodian issues concerning access rules and security violations.
The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up



References: Cloud Computing. (2012, Nov). Retrieved from http://www.cisco.com Principles of IT Seurity. (2012, Nov). Retrieved from http://www.blink,ucsd.edu Secure Socket Layer. (2012, Nov). Retrieved from http://www.searchsecuritytechtarget.com Wallace, K. A. (2005, June). Internet Security Problems Can Be Prevented. Retrieved from http://www.ezinearticles.com

You May Also Find These Documents Helpful

  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    POOP DYNASTY

    • 2230 Words
    • 9 Pages

    Introduction to Cloud Computing When you store your photos online instead of on your home computer, or use webmail or a social networking site, you are using a “cloud computing” service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a “cloud computing” service. Cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, at another location, to store your information or use its applications. Doing so may give rise to certain privacy implications.…

    • 2230 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Computing Technology

    • 2478 Words
    • 10 Pages

    Cloud computing is Internet ("cloud") based on development and use of computer technology ("computing").It is a style of computing in which dynamically scalable and often virtualised resources are provided as a service over the internet.Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them.…

    • 2478 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cloud computing has recently developed as a new model for hosting and delivering services over the Internet. Since the development, the Cloud computing attracts different business owners by way of eliminating the requirement to plan in advance for IT hardware and software acquisition allowing the enterprises to start from scratch and they do not need to increase their resources but only when there is a growth in the service. Regardless of the fact that cloud computing offers huge opportunities to the IT industry and businesses, yet the development of cloud computing technology is currently in the early stages and has many issues to be addressed and researched. The purpose of this paper is to highlight the cloud computing technology pros and cons and its key concepts, from the business perspective as well as presenting all research challenges and security issues, plus identifying all important research directions in this new trend, so a better understanding of this technology will be obtained by enterprises prior to the technology adoption.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Cloud computing offers software and hardware resources and in some cases human services over a distributed environment that can be shared and utilized on demand through internet. Business owners can use these resources as per their requirement even if that is for few hours a day or few days a month and have to pay only for that actual use. Thus this relatively new concept is becoming highly popular among IT organizations because of its flexibility and cost effectiveness. It is highly scalable and also can span quickly according to the requirements of individual organization yet still sharing the same resources.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    In the expanding competitive world business owners and investors must begin to start thinking outside the box to gain the benefits in a full scale. It is no secret that the fact to control a business on a global scale is a productive and efficiency information system. According to Laudon K. & Laudon J. (2007), information system can be defined as components related within working in unison to gather, process, store and distribute information to support decision making, coordination, control, analysis and visualization in an organization. How to overcome the obstacles which challenges the companies who seek to get in to new industries and widen the business to achieve the goals is the burden that they carries and it may seem impossible. This is where cloud computing can be helpful with the utilities that comes with it to enable a nimble start up to compete with the competitors’ captive data centres. According to Thomas D. (2009), Cloud programming models has the capacity to adjust the web, facilitating end user application development that lay the foundation for enterprise and even Internet scale applications. Under these circumstances, Business…

    • 2357 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    References: 4. Timothy Chou.,Introduction to Cloud Computing Business & Technology, 2010 by Active Book Press, 2nd Edition…

    • 2542 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    These values define the nature of what South Africans stand for and how we would respond to issues of national security. Internally our belief in the bill of rights means that new legislation to combat terrorism will be balanced with the protection of civil liberties and strong parliamentary and judicial oversight.…

    • 3053 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cloud Computing in Banks

    • 287 Words
    • 2 Pages

    Security is a key concern among potential users and the cloud model is evolving accordingly. Once the security concern…

    • 287 Words
    • 2 Pages
    Good Essays
  • Best Essays

    adopting the benefits of cloud computing through innovative research approaches. The concept of “computing in the cloud” is about the delivery of IT services that run in a web browser; the type of services ranges from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. Storage of digital…

    • 3548 Words
    • 15 Pages
    Best Essays