answersLogoWhite

0

Objectives of information Security and control=

1. To prevent unauthorized access to the location.

2. to prevent confidentiality of data.

3. To provide disaster recovery system.

4. prevention of malicious damage.

5. prevention of prevention from accidental damage.

Characteristics of IS&c=

1.Integrity=A system functions as intended then it is considered to have integrity.

So the system designers make such a system that can work even if one or more components do not work.

2.Auditability=Easy to examine,verify,and demonstrate the performance of a system.

3.Controlability=helps management to have control over use and content of a system.

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Computer Science

Advantages and disadvantages of External database?

Dis Advantages: Security may be compromised without good controls, Extra hardware may be required, System is likely to be complex Advantages: Reduced data redundancy, Secured data, Integrated data, Controlled data inconsistency


What Provide Data Security Technologies and elaborate on how each is implemented?

Data security technologies include encryption, access controls, and data masking. Encryption converts data into a coded format that can only be read with a decryption key, ensuring that even if data is intercepted, it remains unreadable. Access controls restrict who can view or manipulate data, implemented through user authentication methods like passwords, biometrics, or two-factor authentication. Data masking involves obscuring specific data within a database, allowing for the use of realistic data in non-production environments without exposing sensitive information, often achieved through algorithms that replace original data with fictional but realistic values.


What has become more important because of the increased use of computers the Internet and WWW?

Data integrity and data security


What is the role of data manager in dbms?

DBMS stands for DataBase Management System. So it's role is basically to manage the database. More specifically this software controls the storage, organization, retrieval, integrity and security of the data in the database.


What controls the flow of data between the computer and network cable?

The Network Interface Card (NIC) or modem (Dial-up) controls the flow of data between your computer and the cable.

Related Questions

What methods can be used to protect sensitive data from prying eyes?

Security controls (which include physical controls) Encryption


What is data privacy?

Data privacy is a branch o security of data that controls the proper handling of the data - consent, notice, and obligatory regulations.


What is security control related to information systems?

In security control, information systems are used to communicate between officers and store classified data. Ideally, information systems help to ensure security and make work easier for security officers.


How do you handle unclassified data?

Unclassified data should be stored, processed, and transferred using standard security measures such as encryption, access controls, and regular audits to ensure integrity and confidentiality. It is important to follow data security best practices to protect unclassified data from unauthorized access or breaches. Regularly update security protocols to address any new vulnerabilities that may arise.


Security Risks in Cloud Computing?

The largest security threat to cloud computing is data loss and data breaches. When businesses place massive sets of sensitive data in the cloud, they expose themselves as an easy target for cyber attackers. There are specific Security risks in Cloud Computing that the companies must neutralize before losing everything. The proper access controls, encryption of data, detection of threats, and verification for compliance enhance cloud security.


What are 3 of the IT infrastructure domains affected by internal use only data classifications?

Three IT infrastructure domains affected by internal use only data classifications include network security, access controls, and data storage. Network security measures need to be implemented to prevent unauthorized access to the data, access controls should be set up to restrict access to only authorized personnel, and data storage protocols should ensure that the data is stored securely and only accessible to authorized users.


What is Data security concern on electronic distribution systems?

Data security concerns on electronic distribution systems include the protection of sensitive information from unauthorized access, data breaches, and cyber attacks. Safeguards such as encryption, access controls, monitoring tools, and regular security assessments are essential to mitigate these risks and ensure the integrity and confidentiality of the data being distributed electronically. Compliance with data protection regulations and standards is also crucial in maintaining the security of electronic distribution systems.


What type of data must be must be handled and stored properly based on classification markings?

Classified information data must be handled and stored properly based on classification markings and handling caveats.


How do you describe managment operational and technical controls and explain when each would be applied as part of a security framework?

Management controls focus on the policies and procedures that govern an organization's security practices, ensuring compliance and risk management. Operational controls involve the day-to-day processes and practices that protect assets and data, such as incident response and employee training. Technical controls are implemented through technology, such as firewalls and encryption, to safeguard systems and data. Each type is applied based on the specific needs of the organization: management controls set the strategic direction, operational controls handle implementation, and technical controls provide the necessary technical safeguards.


What degrees or certifications are necessary for a job in security analysis?

You'll require a Bachelor’s degree. Other key considerations are: Minimum of 3 years of demonstrated experience in information security, privacy or a data protection-related function. Proven understanding of how data flows through an organization, associated risk, and appropriate mitigating security controls. Proven understanding of security technologies such as intrusion prevention, event management, and encryption. Ability to meet deadlines. Experience building network of relationships across functions. Ability to correlate enterprise risk with appropriate administrative, physical and technical security controls. Experience working with vendor management and associated privacy and security controls.


Advantages and disadvantages of External database?

Dis Advantages: Security may be compromised without good controls, Extra hardware may be required, System is likely to be complex Advantages: Reduced data redundancy, Secured data, Integrated data, Controlled data inconsistency


What is the purpose of Payment Card Industry Data Security Standard?

The purpose of the Payment Card Industry Data Security Standard is to manage card-holder information for debit, credit, pre-paid, ATM, e-purse and POS cards. You can learn more about this at the Wikipedia.