answersLogoWhite

0

Objectives of information Security and control=

1. To prevent unauthorized access to the location.

2. to prevent confidentiality of data.

3. To provide disaster recovery system.

4. prevention of malicious damage.

5. prevention of prevention from accidental damage.

Characteristics of IS&c=

1.Integrity=A system functions as intended then it is considered to have integrity.

So the system designers make such a system that can work even if one or more components do not work.

2.Auditability=Easy to examine,verify,and demonstrate the performance of a system.

3.Controlability=helps management to have control over use and content of a system.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What methods can be used to protect sensitive data from prying eyes?

Security controls (which include physical controls) Encryption


What is data privacy?

Data privacy is a branch o security of data that controls the proper handling of the data - consent, notice, and obligatory regulations.


What is security control related to information systems?

In security control, information systems are used to communicate between officers and store classified data. Ideally, information systems help to ensure security and make work easier for security officers.


How do you handle unclassified data?

Unclassified data should be stored, processed, and transferred using standard security measures such as encryption, access controls, and regular audits to ensure integrity and confidentiality. It is important to follow data security best practices to protect unclassified data from unauthorized access or breaches. Regularly update security protocols to address any new vulnerabilities that may arise.


Security Risks in Cloud Computing?

The largest security threat to cloud computing is data loss and data breaches. When businesses place massive sets of sensitive data in the cloud, they expose themselves as an easy target for cyber attackers. There are specific Security risks in Cloud Computing that the companies must neutralize before losing everything. The proper access controls, encryption of data, detection of threats, and verification for compliance enhance cloud security.


What is Data security concern on electronic distribution systems?

Data security concerns on electronic distribution systems include the protection of sensitive information from unauthorized access, data breaches, and cyber attacks. Safeguards such as encryption, access controls, monitoring tools, and regular security assessments are essential to mitigate these risks and ensure the integrity and confidentiality of the data being distributed electronically. Compliance with data protection regulations and standards is also crucial in maintaining the security of electronic distribution systems.


What are 3 of the IT infrastructure domains affected by internal use only data classifications?

Three IT infrastructure domains affected by internal use only data classifications include network security, access controls, and data storage. Network security measures need to be implemented to prevent unauthorized access to the data, access controls should be set up to restrict access to only authorized personnel, and data storage protocols should ensure that the data is stored securely and only accessible to authorized users.


What type of data must be must be handled and stored properly based on classification markings?

Classified information data must be handled and stored properly based on classification markings and handling caveats.


What degrees or certifications are necessary for a job in security analysis?

You'll require a Bachelor’s degree. Other key considerations are: Minimum of 3 years of demonstrated experience in information security, privacy or a data protection-related function. Proven understanding of how data flows through an organization, associated risk, and appropriate mitigating security controls. Proven understanding of security technologies such as intrusion prevention, event management, and encryption. Ability to meet deadlines. Experience building network of relationships across functions. Ability to correlate enterprise risk with appropriate administrative, physical and technical security controls. Experience working with vendor management and associated privacy and security controls.


Advantages and disadvantages of External database?

Dis Advantages: Security may be compromised without good controls, Extra hardware may be required, System is likely to be complex Advantages: Reduced data redundancy, Secured data, Integrated data, Controlled data inconsistency


What does data Controller mean?

A data controller is a person who controls the data.


What is the purpose of Payment Card Industry Data Security Standard?

The purpose of the Payment Card Industry Data Security Standard is to manage card-holder information for debit, credit, pre-paid, ATM, e-purse and POS cards. You can learn more about this at the Wikipedia.