Tuesday, July 28, 2009

23rd Jul 2009 - Lab 2: The Goals of Information Technology Security

Today is the 2nd lab session of Information Technology Security;however, Mr. Zaki had canceled the lab session because some reasons.

Although the class is canceled, Mr.Zaki asks us to study the lab at home and do the review question. Lab 2 is about the goal of information technology security. We study information technology security because of confidentiality, availability and integrity.

Confidentiality mean provides protection to computer related assets from being used by unauthorized user. Its mean only the right person who has the authority can read, view, print or even knowing the existing of the object. Confidentiality also called as privacy or secrecy. While availability makes sure authorized user can access information at any time without any failure. The last goals; integrity ensures data can be modified by authorized parties and by authorized mechanism only. Information can be added, updated or deleted; hence it must be done in a correct ways and by the right person to ensure the correctness and validity of the information.

In order to create a secure computing environment, the balance between the goals is very important. This is because if one of the goals is more or less it will affect the functionality of the system. For example, if we concentrate on providing the total confidentiality of the information then the availability of the data is less.


Relationship between confidentiality, integrity and availability.


No comments:

Post a Comment