What is important three dimensions of security in a system

Assignment Help Management Information Sys
Reference no: EM133403300

Assignment:

Confidentiality, integrity, and availability, or the CIA triad of security, is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Use this forum to provide three examples and justification:

  1. Where the confidentiality of a system is more important than the integrity or availability of that system.
  2. Where the integrity of a system is more important than the confidentiality or availability of that system.
  3. Where the availability of a system is more important than the confidentiality or integrity of that system.

For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM133403300

Questions Cloud

Define some functional and nonfunctional requirements : Define the purpose of your business. Define some functional and nonfunctional requirements. Define some acceptance test criteria.
Describe how hypervisors work : Describe how hypervisors work. How does the cloud affect the security of an organization's data?
Describe the laws and rules that govern sovereignty : Describe the laws and rules that govern sovereignty, citing specific, credible sources that support your assertions and conclusions.
Introduce potential information systems security : What would be your approach to introduce potential information systems security (ISS) risks to management?
What is important three dimensions of security in a system : This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.
Identify organization issuing the gdpr privacy statement : Identify the organization issuing the GDPR privacy statement and affirm that it operates under the GDPR.
Write a little man program to accept an indefinite number : Write a Little Man program to accept an indefinite number of input values. The output value will be the largest of the input values.
What is the timeline releasing 5g to the global population : What is the timeline of releasing 5G in the United States? List the timeline related to each of the major network providers?
Find a recent example of vulnerability in the news : Find a recent example of vulnerability in the news. What could have been done to prevent this event from happening?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the inherent design issues across hci environments

The specific course learning outcomes associated with this assignment are- Describe the inherent design issues across HCI environments.

  Evaluate the level of impact of it enterprise architecture

Evaluate the level of impact of IT / enterprise architecture on information management (e.g., the flow of information throughout the company / organization, etc.) within a company or industry of your choice.

  Why is a search engine a big data application

Mention four possible functions that a BI Competency Centre (BICC) would serve within an organization, and give a brief description of each.List and describe three levels or categories of analytics that are most often viewed as sequential and inde..

  Why is cross-border cybercrime expanding rapidly

Why are authentication and authorization important to e-commerce? Why is cross-border cybercrime expanding rapidly? Dis-cuss possible solutions.

  How computer hardware and application impact it professional

Consider how computer hardware, operating systems and applications impact the IT professional. Provide your thoughts about how the computing environment contributes to an individual's success or failure on the job.

  Describe the impact and the vulnerability of the scada

Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.

  How to assure information continuity and recovery

How to Assure Information Continuity and Recovery in Business Continuity Planning and Disaster Recovery?

  Why did you select phd in information technology

Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?

  Describe characteristics of effective business-it alignment

Describe the characteristics of effective business-IT alignment. What are the benefits and challenges of implementing knowledge management systems in orga

  How much damage it caused to the corporate

Type of sections of Saudi anti cybercrime law applied to different cybercrimes occurred in corporate based on their nature, occurrence and type? Explain the whole Forensics process applied to specific cybercrime to justify that it has been committ..

  What are the benefits of networking

What are the benefits of networking within an integrated system and What are the challenges of networking within an integrated syste

  Discuss the use of cloud backup strategies

Discuss the importance of user technology security education within organizations. What topics should be included in security education and training?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd