Page 42 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 42

Information  Security and Privacy




                    Notes          3.4.2 Integrity

                                   The second pillar is known as integrity of the information. This is related with the eminence and
                                   dependability of information; like management  can be guaranteed that  the information  on
                                   which decisions are relied has not been tailored dishonestly or else when the data is transferred,
                                   captured and accumulated. One method of offering integrity is to link a particular indicator or
                                   message digest at the end of the message that is going to be sent. If this digest remains undamaged
                                   during transit then the integrity has been conserved. Integrity signifies that an asset or information
                                   can only be tailored by authorized parties or only in authorized manners.

                                   3.4.3 Availability

                                   The third pillar is the availability of the information. When systems or data are unavailable,
                                   opportunities may  be vanished,  deadlines missed  or commitments  evaded. Work  progress
                                   could be weakened if the information is not available when it is needed. Even if the information
                                   is precisely what is required to fulfill business requirements, if it is not available when required
                                   to accomplish a task, it turns out to be useless.
                                   Confidentiality, integrity and availability are broadly acknowledged as the three vital pillars of
                                   information security. Without sufficient safety in place to avert illegal activities, an organization’s
                                   most significant asset, namely its information, is at risk. Thus, it is significant that this asset be
                                   secluded and secured by means of these three pillars. There, are additional support structures of
                                   information security that could be used in combination with the three main pillars to balance
                                   them, namely; identification and authentication, access control/authentication and non-denial.




                                     Notes   Information  security  is  tremendously  significant  to  the  well-being  of  any
                                     organization and, therefore, it is necessary to guarantee the  pillars of confidentiality,
                                     integrity and availability. There are, however, many troubles or false opinions encountered
                                     when making sure that information security is a part of an organization.

                                   Self Assessment

                                   Fill in the blanks:
                                   12.  ....................... means that sensitive information must be prohibited from being revealed to
                                       illegal parties.
                                   13.  ....................... signifies that an asset or information can only be tailored by  authorized
                                       parties or only in authorized manners.

                                   3.5 Information Classification

                                   We can categorize the information on the  basis of the purpose for which the information  is
                                   utilized. Broadly, we can categories information as following:

                                   1.  Strategic Information:  Strategic information  is the  information needed  for long  range
                                       and strategic decisions. Strategic decisions are taken  by the  top management  people.
                                       Strategic information is required for planning and policy formulation of the business.
                                       Strategic information  includes information  concerned with  new technologies,  market
                                       availability, raw-material costs, new product developments, manpower planning and
                                       competitors, etc.




          36                                LOVELY PROFESSIONAL UNIVERSITY
   37   38   39   40   41   42   43   44   45   46   47