We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.
Thank you!
View updated privacy policy
We've encountered a problem, please try again.
50% found this document useful (4 votes) 7K views 49 pages Critical Characteristics of Information In Information Security Critical Characteristics of Information In Information Security © Attribution Non-Commercial (BY-NC) PPT, PDF, TXT or read online from ScribdDescription:
Original Title
Copyright
Available Formats
Share this document
Did you find this document useful?
50% found this document useful (4 votes)
7K views49 pages
Critical Characteristics of Information in Information Security
Original Title:
Critical Characteristics of Information In Information Security
Description:
Critical Characteristics of Information In Information Security
Full description
You're Reading a Free Preview
Pages 8 to 13 are not shown in this preview.
You're
Reading a Free Preview
Pages 17 to 20 are not shown in this preview.
You're Reading a Free Preview
Pages 24 to 45 are not shown in this preview.
Information is meaningful data which has to be protected in order to protect the privacy, security, identity of an organization or a person or a nation. An information is called valuable because of few characteristics. The main characteristics which make an information valuable are
1. Confidentiality
Confidentiality ensures that an Information is accessible to only an authorized user. The main pupose of confidentiality is to protect the sensitive information from reaching the wrong hands.It is used to maintain the privacy of the people. Encryption is a good example of confidentiality.
2. Availability
Information should be available to an authorised person when it is requested for. It is the guarantee of access to the authorised individual to information. Keeping all the hardware and software up to date and keeping back up, taking proper recovery measures will ensure availability of data.
3. Integrity
Integrity maintains the correctness or accuracy of the information while the data is in transit, storage or processing. It is the guarantee that information is trust worthy and not tampered. This attribute ensures that an unauthorised person will not be able to modify the data.
RSA digital signature, SHA1 hash codes are good examples.
4. Authentication
It is verifying whether the user, data, transactions involved is genuine. This attribute ensures that only genuine or right people are given access to the information. Login mechanisms can be used to verify the authenticity of users
5. Non-Repuditiation
This is a property of information which is used to holds a person responsible for the information he sent or received. In future, he cannot deny his role in sending or receiving the information.
- All Textbook Solutions
- Principles of Information Security (6th Edition)
- Describe the critical characteristics of information. How are they used in the study of computer security?
Chapter 1, End of Chapter, Review Questions, Exercise 7
Describe the critical characteristics of information. How are they used in the study of computer security?
Verified Answer and Explanation
Explanation
Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis
Verified Answer
facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus