|
|
|
What is the basic security requirement and Data Vulnerabilities? by alan david230
|
|
|
What is the basic security requirement and Data Vulnerabilities? |
|
|
|
Computers,Software,Internet
|
|
To provide the best protection of network and procedures of technologies that you deploy need to guarantee three things data confidentiality, data integrity and availability of system and data. Data confidentiality: it means to provide the data confidentiality that only authorized persona access the sensitive data information. Data integrity: it mean only authorized person can change sensitive information and provides a way to detect whether data has been tampered with during transmission and this might also guarantee the authenticity of data. Availability of system and data: The data availability and system provides uninterrupted access by authorized users to important computing resources and data. When design a network security plan then must know about the following. 1. Aware about threat that could compromise security 2. The associated risk of the threats 3. To know about the cast to implement the proper security countermeasures for a threat 4. And also know about cost versus benefit analysis to determine whether it is worthwhile to implement the security countermeasures Data Vulnerabilities The hackers, virus and worms monopolize the headline about information security and risk management is the most important aspect of security architecture for administrators. The less exciting and glamorous area is risk management. It is based on specific principles and concepts that are related to asset protection and security management. The asset is valuable for every organization to know which assets you are trying to protect as well as their value, exposure and location. You can more effectively determine the time money and effort to spend in securing those assets. The data vulnerabilities are a weakness in a system that could be exploited by a threat. The data vulnerabilities are sometimes found in the protocols themselves as in the case of some security weaknesses in TCP/IP protocol but the sometime vulnerabilities are in the operating systems and applications. The only written security policies might also be a source of vulnerabilities. The outside threat or unpasteurized access to assets is a potential danger to assets. When someone or something identifies a specific vulnerability and exploits it then threat is realized. If in some case vulnerability exists theoretically but has not yet been exploited then the threat is considered latent. The entity of the vulnerability is known as the threat agent. Siconsult is offering Si ELV Design consultant KSA services to offices of all type and also offering expert level recommendation to them so that they will get best protection against such incidents. The Level recommendation to them so that they will get best protection against such incidents.
Related Articles -
Si Managed Security Services, SiConsult Managed Security Services, Security Consulting, Si, Si ICT Consulting, ICT Consulting, Si Engineering & Tech,
|
Rate This Article |
|
|
|
Do you Agree or Disagree? Have a Comment? POST IT!
Reader Opinions |
|
|
|
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|