How are critical characteristics of information used in the study of information security?

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy

We've encountered a problem, please try again.

50% found this document useful (4 votes)

7K views

49 pages

Description:

Critical Characteristics of Information In Information Security

Original Title

Critical Characteristics of Information In Information Security

Copyright

© Attribution Non-Commercial (BY-NC)

Available Formats

PPT, PDF, TXT or read online from Scribd

Share this document

Did you find this document useful?

50% found this document useful (4 votes)

7K views49 pages

Critical Characteristics of Information in Information Security

Original Title:

Critical Characteristics of Information In Information Security

Description:

Critical Characteristics of Information In Information Security

Full description

You're Reading a Free Preview
Pages 8 to 13 are not shown in this preview.

You're Reading a Free Preview
Pages 17 to 20 are not shown in this preview.

You're Reading a Free Preview
Pages 24 to 45 are not shown in this preview.

Information is meaningful data which has to be protected in order to protect the privacy, security, identity of an organization or a person or a nation. An information is called valuable because of few characteristics. The main characteristics which make an information valuable are

1. Confidentiality

Confidentiality ensures that an Information is accessible to only an authorized user. The main pupose of confidentiality is to protect the sensitive information from reaching the wrong hands.It is used to maintain the privacy of the people. Encryption is a good example of confidentiality.

2. Availability

Information should be available to an authorised person when it is requested for. It is the guarantee of access to the authorised individual to information. Keeping all the hardware and software up to date and keeping back up, taking proper recovery measures will ensure availability of data.

3. Integrity

Integrity maintains the correctness or accuracy of the information while the data is in transit, storage or processing. It is the guarantee that information is trust worthy and not tampered. This attribute ensures that an unauthorised person will not be able to modify the data.

RSA digital signature, SHA1 hash codes are good examples.

4. Authentication

It is verifying whether the user, data, transactions involved is genuine. This attribute ensures that only genuine or right people are given access to the information. Login mechanisms can be used to verify the authenticity of users

5. Non-Repuditiation

This is a property of information which is used to holds a person responsible for the information he sent or received. In future, he cannot deny his role in sending or receiving the information.

  1. All Textbook Solutions
  2. Principles of Information Security (6th Edition)
  3. Describe the critical characteristics of information. How are they used in the study of computer security?

Chapter 1, End of Chapter, Review Questions, Exercise 7

Describe the critical characteristics of information. How are they used in the study of computer security?

Verified Answer and Explanation

Explanation

Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis

Verified Answer

facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus

Related Exercises

How are critical characteristics of information used in computer security?

Confidentiality ensures that an Information is accessible to only an authorized user. The main pupose of confidentiality is to protect the sensitive information from reaching the wrong hands.It is used to maintain the privacy of the people.

What is the characteristics of information security?

What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles.

What is critical information security?

What is Critical Information Infrastructure? The Information Technology Act of 2000 defines Critical Information Infrastructure as a computer resource, the incapacitation or destruction of which shall have debilitating impact on national security, economy, public health or safety.

What are the critical characteristics of information give atleast 5?

Five characteristics of high quality information are accuracy, completeness, consistency, uniqueness, and timeliness.