Preview

12 Principles

Good Essays
Open Document
Open Document
518 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
12 Principles
There are 12 basic principles to Information Security. The first principle is that there is no such thing as absolute security. What this means is that with the correct tolls, skills and time anyone can hack into a system. The second principle are the three security goals, which are C.I.A; Confidentiality, Integrity and Availability. What this means is that everyone must consider what data they want to be protected. It also means that one must be sure as to whom they want to access this information and when they should access this information. The third principle is when a company is protecting their data with armed guards, cameras, safes and secured passwords. This principle is called Defense In Depth. The fourth principle is when people are left alone they tend to make the worst decisions.

Function and Requirements is the fifth principle for information security. Function details what the system should be doing and the assurance requirements describe how the functions should be implemented. The following two questions should be asked when this principle comes into play; does the system do the right thing? Does the system do the right things and in the right way. The sixth principle is that Security through Obscurity is Not an Answer. This principle simply means that if you believe that hiding information can prevent hackers from hacking into your system then you are mistaken. By misleading anyone into a sense of false security is more detrimental than anything. Risk Management is the seventh principle. Its’ simple to understand this principle, what is the consequence of this loss and would this loss occur again. The eight principles are preventative, detective and responsive controls. Take the steps to detect the threat, prevent it and lastly respond while the threat is occurring or after. What this means is that it will detect the threat, try to prevent the threat from happening. Complexity is The Enemy of Security is the ninth

You May Also Find These Documents Helpful

  • Satisfactory Essays

    8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    There is also principle that should be followed when securing an application. They are minimize attack surface area, establish secure defaults, employ the principles of least privilege and defense in depth, fail securely, and not trusting services. There are also principles such as having a policy of separation of duties, avoiding security by obscurity, keeping security simply, and fixing security issues correctly.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    A virus or malware can impact which of the three tenets of information systems security (confidentiality,…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Guilt. “A cognitive or emotional experience that occurs when a person believes that they have violated a moral standard and bears significant responsibility for that violation.” Guilt is portrayed a great deal in Lasse Hallström’s What’s Eating Gilbert Grape (1993). Guilt is depicted within the film through Gilbert as he is indecisive between leaving and staying, it is depicted through Bonnie as she believes that she is an incompetent wife and parent, and through Betty Carver, who holds herself responsible for the death of her husband. What’s Eating Gilbert Grape follows the trapped and tedious life of Gilbert Grape (Johnny Depp), through his struggles with responsibility when caring and providing for his family and mentally disabled brother…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Good Essays

    204 Principles

    • 787 Words
    • 4 Pages

    I can confirm that the evidence listed for this unit is my own work and was carried out under the conditions and context specified in the assessment specification.…

    • 787 Words
    • 4 Pages
    Good Essays
  • Good Essays

    By implementing the information security characteristic would also be productive and non-cost efficient. In each scenario the attacker’s goal was not proposed for financial gain, but due to a political or personal dispute. So, by establishing a security system to defend critical data, such as alarm codes, safe blends, and other important documentation would not have been affective in any of the giving situations.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mental Capacity Act Nvq 5

    • 6650 Words
    • 27 Pages

    THE FIVE STATUTORY PRINCIPLESThe five principles are outlined in the Section 1 of the Act. These are designed to protect people who lack capacity to make particular decisions, but also to maximise their ability to make decisions, or to participate in decision-making, as far as they are able to do so.…

    • 6650 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Mod 1 Case Assingment

    • 1465 Words
    • 5 Pages

    Some of the benefits of having frameworks for information security management are, that they serve as a common ground for integrating all types of information security functions. It also helps answer question of how to react to information security issues. As well as, helping identify what the important components involved in establishing and maintaining information security initiatives. Since our information faces more potential security breaches than ever before (Ma, Schmidt, Pearson, 2009 p. 58).…

    • 1465 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    The physical aspect of the security plan is building design, fences, locks, lighting, and alarm systems. Another aspect of physical security is security personnel. The physical aspect of the security plan may be the main focus on protecting and deterring crime. The personnel aspect of a security plan is protecting people within a company or organization and this comes from the presence of the security guard. Another aspect of personnel security is identification badges. Identification badges allow security officers to check the identity and the security clearance of individuals who come into the company. The information aspect of a comprehensive security plan has background checks. Another aspect of information security would be to put certain papers through a shredder and dispose important documents properly. One more aspect of information security would be to encrypt messages and codes. Encrypting files would provide security, so that no one would be able to access…

    • 1246 Words
    • 5 Pages
    Better Essays
  • Good Essays

    One of the most important principles is to always plan ahead and never over book your schedule. This is the most important for a variety of reasons. Time management helps you to make sure you’re taking the time out to successfully complete your work and fulfill any commitments made to others. It’s important to be successful and stay true to your commitments because it shows you’re professional and dependable.…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Way of the Shepherd

    • 699 Words
    • 3 Pages

    - The 4th principle suggests that a leader/manager should always see to it that their people are in good hands. Always feed…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy

    • 1324 Words
    • 6 Pages

    Principle 3 emphasize on the protection of the peace for people to surf on the Internet, and avoid they were disturbed by spasm e-mail illegally.…

    • 1324 Words
    • 6 Pages
    Good Essays