Furthermore, the main objective of cryptography is to contribute confidentiality of communication between entities. Other than that, according to Delfs and Knebl (2007), cryptography offers solutions to prevent problem such as data integrity, authentication and non-repudiation from
4.2 Four Essentials of Security Security is made up of four essential parts: authentication, data integrity, non repudiation, and confidentiality. Authentication involves ensuring that transmissions and messages, and their originators, are authentic and a recipient is eligible to receive specific categories of information.  Data integrity consists of ensuring that data is unchanged from its source and has not been accidentally or maliciously altered. Non repudiation ensures that evidence is available to the sender of the data that the data has been delivered. This includes the ability of a third party to verify the integrity and origin of the data.
The primary cause of an IT infrastructure audit is to guarantee all IT resources available within a business or organization reach set goals and performance has been achieved while following the correct and the most appropriate processes. The specific objectives of undertaking an IT infrastructure audit may include: · Ensureing that the set infrastructure is compliant with the legal and regulatory requirements. · Ensuring that the IT infrastructure enforces the confidentiality of its corporate data. · Assessing whether the IT infrastructure in an organziation helps in attaining and maintaining data integrity. · Ensureing that the IT infrastructure guarantees availability and reliability of the available
Grid computing may or may not be in the cloud depending on what type of users who are using it. If the users are systems administrators and integrators, What they care is how things are maintained n the cloud. They upgrade, install, and virtualize servers and applications. If the users are consumers, they do not care how things are run in the system. Grid computing requires the use of software that can divide and farm out pieces of a program as one large system image to a great number of computers.
Data security is the practice of keeping data protected from corruption and unauthorized access. The aim of data security is to make sure privacy is implemented in protecting personal data. Data is raw information that is stored either in a database or somewhere lying inside your hard disk drive. It can be any kind of information you store, privately safe or publicly viewable. However, no matter how secured we want our data is, there comes a time that our private data are breached even though we know how to secure files into our system.
They would neither damage the target systems nor steal information. Instead, they would evaluate the target system’s security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them. Ethical hacking is a way of doing a security assessment. Like all other assessments an ethical hack is a random sample and passing an ethical hack doesn’t mean there are no security issues. An ethical hack’s results is a exhaustive description of the findings as well as a proof that a hacker with a definite amount of time and skills is or isn’t able to successfully attack a system or get access to certain information.
Useful web applications, like Facebook and Google Calendars, are starting to be used more often and employees need to know that they should not store sensitive information on these applications (Elmerraji). Another way to defend against hackers is to establish the appropriate security technology, like firewalls and antiviruses, onto the business’ computer systems. After proper security is in place, the settings and system options should be selected that meet the needs of the business. Proper upkeep in the security is important
There are many responsibilities of IT leaders for electronic record management. The main responsibilities of the IT leaders that should they carry out and play a role to managing the migration of electronic records through the changes of technology such as software, hardware and storage media. The way to protecting the security of government information is the government will be make a policy based on evidence based on records. Records must be kept accurately because it has legal implications. It is easier to edit or
With fingerprint authentication, there is no need to provide sensitive information or save passwords. In this way, it physically inconceivable for hackers to take over your accounts. Is Biometric Authentication The Future of Digital Security? Biometric authentication analyzes specific attributes. Aside from fingerprints, it can also use the person’s face, voice, penmanship, palm print, retina or iris, hand geometry, or a combination of two or more these characteristics.
This enables proactive advisory procedures to bridge the gap between business process (policies and regulation) and IT processes policies and regulation requirement. The technological transformation has increased the awareness of auditors to leverage IT skills and facilitate audit using various IT tools (software & application). The functions of the IT infrastructure, its associated risk and compliance requirement including IT controls has to be checked by internal auditors using standard IT audit framework. Managing IT risk Assessment, monitoring and testing controls. Auditors also create standard procedures for change management e.g.