question archive The vital security components that are needed to protect information system infrastructure revolve around three security areas which are, · Confidentiality: data and information are protected from unauthorized access
Subject:Computer SciencePrice: Bought3
The vital security components that are needed to protect information system infrastructure revolve around three security areas which are,
· Confidentiality: data and information are protected from unauthorized access.
· Integrity: Data is intact, complete, and accurate.
· Availability: IT systems are available when needed.
· Authenticity: A security policy includes a hierarchical pattern. It means inferior workers is typically certain to not share the small quantity of data they unless approved.
· Non-Repudiation: It is the assurance that somebody cannot deny the validity of one thing. It may be a legal thought that’s widely used in data security and refers to a service that provides proof of the origin of information and the integrity of the information.
To protect confidentiality aspect access control mechanisms should be used to control who has access to information. these access control mechanisms can be biometrics authentication, security policies, and other access control systems. The other important thing is to protect the critical information from unauthorized modification. secondly, the availability aspect can be protected by firewalls and other protective network devices.
A hardware security module is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
Logical access control limits connections to computer networks, system files and data.
Types of Access control Mechanism
· Discretionary Access Control: owners/admin authorize use of resources
· Role Based Access Control: grants access to groups based on business functions
· Rule Based Access Control: rules made to govern access to users