Information Security and Safe Computing: Report on Security Concepts

Verified

Added on  2023/01/16

|3
|427
|83
Report
AI Summary
This report provides an overview of information security and safe computing, focusing on three key principles: confidentiality, integrity, and availability. Confidentiality ensures that sensitive information is protected from unauthorized access, maintaining the privacy of client data and fostering open communication. Integrity focuses on securing data and preventing unauthorized modifications, both internally and externally, to ensure data reliability. Availability emphasizes the importance of accessible data and resources for authorized users, addressing potential disruptions from various sources such as system errors, natural disasters, and equipment failures. The report cites relevant sources to support the understanding of these principles and their practical applications within a business context.
Document Page
Running head: INFORMATION SECURITY AND SAFE COMPUTING
Information Security and Safe Computing
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY AND SAFE COMPUTING
Information Security and Safe Computing
In the business organization, information security is required to protect against the
unauthorized use of the organizational information such as electronic data and measures to
achieve it. There are three main principles of the information security and safe computing which
are summarized as below:
Confidentiality: The information security protects the confidentiality of the data. It has
importance in the business as it ensures that no such unauthorized access to the information is
occurred and there is no accidental disclosure of the sensitive information to others. Workplace
confidentiality is important for maintaining of trust of the individuals and ensuring an open
communication among the clients and employees (Kim & Solomon, 2016). It keeps the
information of client private over the network.
Integrity: The information security preserves the integrity of the data. Integrity is
required in the business to keep the data secured and protection of system data from the
intentional changes (Dhillon, Syed, & Pedron, 2016). This factor has three goals to prevent
unauthorized users to make modifications to the data, prevent authorized users to make improper
and unauthorized modifications and maintain exterior as well as interior reliability of the data.
Availability: The information security promotes the availability of the data from the
unauthorized usage. It has importance in the business to keep the data as well as resources
available for the authorized usage. The professionals of information security address denial of
service due to undiscovered errors into the implementation of security system (Safa, Von Solms,
Document Page
2INFORMATION SECURITY AND SAFE COMPUTING
& Furnell, 2016). There are losses of information system abilities due to natural disaster and
equipment failures.
References
Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting information security culture: An
organizational transformation case study. Computers & Security, 56, 63-69.
Kim, D., & Solomon, M. G. (2016). Fundamentals of information systems security. Jones &
Bartlett Learning.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]