Page 44 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 44
Information Security and Privacy
Notes Confidentiality is related with guaranteeing that information of a particular classification
is not disseminated to persons outside the group for which it is classified.
Integrity is related with the eminence and dependability of information; like management
can be guaranteed that the information on which decisions are relied has not been tailored
dishonestly or else when the data is transferred, captured and accumulated.
The third pillar is the availability of the information. When systems or data are
unavailable, opportunities may be vanished, deadlines missed or commitments evaded.
We can categorize the information on the basis of the purpose for which the information
is utilized. Depending upon the different types of decisions made by the management,
information is supplied to them according to the needs of their decision.
3.7 Keywords
Accuracy: The accuracy and completeness of information systems and the data maintained
within the systems should be a management concern.
Authenticity: It refers to the constant checks you have to run on the system to make sure
sensitive areas are protected and working properly.
Authorization: It refers to the power you have over distinguishing authorized users from
unauthorized users and levels of access in-between.
Confidentiality: It means that information cannot be access by unauthorized parties.
Information Security: It is the prevention and protection of computer assets from unauthorized
access, use, alteration, degradation, destruction and other threats.
Integrity: It means that information is protected against unauthorized changes that are not
detectable to authorized users; many incidents of hacking compromise the integrity of databases
and other resources.
Logical Computer Security: It involves non-physical protection, such as that provided by
authentication or encryption schemes.
Physical Computer Security: It involves tangible protection devices, such as locks, cables, fences,
safes or vaults.
3.8 Review Questions
1. What do you mean by information security?
2. Enlighten the various principles of information security.
3. What do you mean by “loss of integrity” in database security issue?
4. How accuracy and completeness of information systems can adversely impact the
organization?
5. Make distinction between physical computer security and logical computer security.
6. Explain the concept of confidentiality. Also illustrate why confidentiality is required in
information system.
7. How to ensure the safety, integrity and privacy of corporate information?
8. How data security breaches in an organization?
9. How database of an organization can be damaged?
38 LOVELY PROFESSIONAL UNIVERSITY