Preview

Ethics

Better Essays
Open Document
Open Document
1702 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
1. List the three fundamental security properties and for each give an example of a failure.

CIA is a commonly used standard for information systems security, concentrating on the 3 core goals of confidentiality, integrity and availability of information in the system.
When every time IT team installs a software or a sever, they never forget to analyse the data transport methods, data base, how they provide access for users according to the CIA standards.
Those three fundamental security properties are: 1) Confidentiality Confidentiality is limiting the information access for the users in the system. IT administrator need to identify to which users he should give access rights and which users he shouldn’t give or control. Methods like User identification number and password are commonly used techniques. Although these techniques can prevent unauthorised access you can’t guarantee it is 100% reliable. Confidentiality can be breached due to these factors: Information sharing Carelessness of users. Unsecure document storage
In contrast in real life, students log in to university systems by using their user id and pass words. When they leave they should log off their accounts. But sometimes because of their carelessness they forget to do than and leave that as it is. So when situations like that anyone can use their login and do anything they want. (University of Miami, 1997-2008) 2) Integrity
Integrity is the reliability of information resources. Main concentration is data has not been changed or modified during the communication process. It is very important that the user get exact information which came out from the database or whatever the resources. But yet again there is a possibility that integrity can be break.eg: When a user tries to do online transaction, pay pal or net bank web site might appear as same as the original one interface might be same. But the web address or data base can be a fake one. In that case users can get



References: University of Miami. (1997-2008).Confidentiality, Integrity and Availability (CIA). Retrieved Jan 28, 2013 from http://it.med.miami.edu/x904.xml Benzel.T.V, Irvine.C.E, Levin.T.E, Bhaskara.G, Nguyen.T.D Daswani.N, Kern.C, & Kesavan.A. (2007). Secure Design Principles Retrieved Jan 28, 2013, from http://www.developer.com/java/web/article.php/3667601/Secure-Design-Principles.htm Meunier.P (2008) Confusion of Separation of Privilege and Least Privilege Retrieved Jan 28, 2013 from http://www.cerias.purdue.edu/site/blog/post/confusion-of-separation-of-privilege-and-least-privilege/ Kantarcioglu.M (n.d.) fearless engineering. Ut Dallass: Erik Jonsson School of engineering & computer science Seebach.P (2008) The stateless state retrieved Jan 28, 2013 Retrieved Jan 30, 2013 from http://www.alliancedatacom.com/how-vpn-works.asp

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    The C.I.A. triangle is the industry standard for computer security. It has existed since the development of the mainframe. Because it is the industry standard it is still used today because it's characteristics; confidentiality, integrity, and availability are still just as important in today's society. However, it no longer addresses the full breadth of security concerns faced today, so it instead serves as a foundation for a more advanced system, known as the expanded C.I.A. triangle.…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ethics

    • 498 Words
    • 2 Pages

    The first skill set is learning how to use the four primary ethical perspectives that are used in decision making. These perspectives are called the Four Ethical Lenses. The second skill is learning to use a practical and repeatable decision-making method called the Baird Decision Model. As we become adults, one of our primary responsibilities is to decide what values and ethical priorities are the most important to us. The ethical game simulation assist with that.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Security Principles 3. Threats, Vulnerabilities, Control Measures and Information Assurance 4. Achieving Information Security: Administrative, Physical, Technical Safeguards Security is achieved by addressing its components: confidentiality, integrity, availability and accountability. 1. Confidentiality is the property that data or information is not made available or disclosed to unauthorized persons or processes.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    ethics

    • 1354 Words
    • 4 Pages

    How wrong is it to lie? Take the hypothetical situation where you are in charge of the software for the launch of a rocket that will put a satellite into space. The launch director requires that various people, including you and a meteorologist "sign off" on launching the rocket. The weather is very overcast, and lightning has been detected in the distance. The meteorologist gives the "OK" to launch the rocket. You, however, have serious doubts that the weather is suitable for a launch, but you are not a meteorologist. The software checks all complete successfully, and the software is in perfect working condition for launch. Do you make something up that says the software is not ready to delay for another day with better weather? Do you say yes the software is "OK" and go for launch? [Ward90]…

    • 1354 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    ethics

    • 562 Words
    • 3 Pages

    1. The first one is the most powerful lesson learned from practicing ethical conduct during Boisjoly’s 27-year engineering career in the aerospace industry, is that them, as individuals, become the result-ant sum of each ethical confrontational event as experienced from the beginning of their careers.…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ethics

    • 1074 Words
    • 5 Pages

    The focus of this course is the reasoning process used when we are making decisions. Some reasoning processes are for individual decisions, while others are for social decisions. It is important to remember that the course (and these assignments) are NOT about opinions (your own or the expert’s), but rather about the reasoning process used in arriving at these opinions and decisions.…

    • 1074 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Ethics

    • 752 Words
    • 4 Pages

    A 19 year old college student and addicted gambler was pulled over for erratic driving on the Long Island Expressway. He pulled out a toy pistol and pointed it at the officer, he was then shot and killed. Another incident involving a 45 year old cancer patient had the same ending in new Jersey. He walked into a Pizza Shop and pointed a gun at the officers inside eating. Experts believe that they force the cops to kill them as a form of suicide. Suicide is difficult to commit and forcing an officer to kill you takes away the pressure of completing the task. Some insurance companies don’t cover suicide and religions forbid it so it is away of taking the guilt and shame away from common suicide. 10% of fatal police shootings are brought on by people seeking to die.…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ethics

    • 620 Words
    • 3 Pages

    A married couple, both addicted to drugs, is unable to care for their infant daughter. She is taken from them by court order and placed in a foster home. The years pass. She comes to regard her foster parents as her real parents. They love her as they would their own daughter. When the child is 9 yrs. old, the natural parents, rehabilitated from drugs, begin court action to regain custody. The case is decided in their favor. The child is returned to them, against her will. Does ethic support the law in this case? Discuss…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ethics

    • 375 Words
    • 2 Pages

    In reading the Ethics problem box regarding the Trolley Problem I will attempt to answer the question of would I throw the switch. I have had the chance to research different profiles to try and answer this question.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays