logo

Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment

   

Added on  2022-12-26

9 Pages1488 Words52 Views
Information
Security
Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment_1
Table of Contents
INTRODUCTION ..........................................................................................................................3
TASK ..............................................................................................................................................3
Fundamental concepts associated with the digital security landscape including risks, threats,
attacks, adversaries and security requirements, and in relation to the confidentiality-integrity-
availability (CIA) triangle...........................................................................................................3
Different technologies that constitute the security mechanisms at various levels in a digitally
networked environment...............................................................................................................4
Perform penetration tests to expose the vulnerabilities of a system...........................................5
CONCLUSION ...............................................................................................................................5
REFERENCES................................................................................................................................6
Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment_2
INTRODUCTION
Information security can be defined as the practice that is generally termed as to forbid
the unauthorized access, revealing, interruption, modification, scrutinize, recording or
termination of source of information. It helps to determine the information and assets with their
potential vulnerabilities and impact(Alzahrani, Johnson, Altamimi, 2018). The management
consider in this report is The Mary Seacole Hospital. It involves as the part of information risk
management to decrease the risk probability. It concentrates on efficient policies in the
organisation for its productivity and profitability.
TASK
Fundamental concepts associated with the digital security landscape including risks, threats,
attacks, adversaries and security requirements, and in relation to the confidentiality-
integrity-availability (CIA) triangle
Digital risk are harmful for the digital investment as it focus on the structure of security.
The digital risk of security is an action or event that can loss the casualty of computer software,
hardware and data or content. As most of the details of an individual or the organisation saved as
digitally on computer to coordinate the plan of action and offers the targets of the organisation.
Digital security are the corporate term that describes the resources to protect the
information, data and other valid details. It involves the web services, anti virus software
program, mobile SIM card, biometrics and secured personalized devices.
Cyber security involves the source of protecting integral system, computer system
software and digital division to cover the information and stores as the unauthorized manner of
risk(Bharathi, 2017). As the Mary Seacole Hospital concentrates on the digital modification and
IT adaptation that are the basic emplacement to adapt the remote area of work, work force
capabilities, security and cooperation.
Confidentiality : It evaluates the confidential information that offers the values and
system that involves the set of agreements that restrict the definite sort of information. It
required by law to keep the information private and not to shared by the anyone to
someone. As it is the key element to create the trust between individual and leaders in the
management. The individual in the management will feel reassured as knowing their
Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Host and Application Security
|9
|1653
|308

Network Security & Its Vulnerabilities | Document
|9
|1749
|130

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

IT Risk Management: Cyber Security
|20
|4610
|231

Assignment on Cyber Security 2022
|7
|712
|26