.

Wednesday, April 24, 2019

Security assignment IT Essay Example | Topics and Well Written Essays - 1500 words

Security assignment IT - Essay Example knowledge should retain its one both with time as well as user at that particular instance of time. scene to corruption, un-monitored changes and destructions disrupt the learning to a devalued or unauthentic state. Information can be corrupted while compilation or storage but in most of the cases it happens while transmission.Availability of information is that it is available for all the users at all the times, so that it can be reached by everyone and is received in an integral form. It also takes into context the positive as well as negative users of the information.This characteristic of information secures the information usability possible only for the purposes known to the data owner. Information is not protected from observation, it can be seen by everyone but it is usable only in the ways known to the author.Information systems have a basic characteristic of identification of the information requester. A system has this characteris tic when it can identify the one-on-one user while user sends the request for the information.When the process of identification and authentication is completed, it is checked that the requesting user has the agency to the requested context and has been provided the authorization permissions from the proper authority.As if information is not confidential, a lot of valuable business decisions can leak from the strategic departments of the organization, which gives an organizations strategic information to the competition, which is hazardous to whatever organization for its financial as well as strategic pursuits.Privacy, authentication and authorization are to make sure the integrity, availability and security of the system. In the lack of these characteristics, information is just a collection of content, which no one knows how to access and anyone can access it without any permissions taken from the owner of the

No comments:

Post a Comment