服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Security_Designs
2013-11-13 来源: 类别: 更多范文
Security Designs
Research/Study Plans
This paper describes design methods that will help Information security professionals develop a strategy to protect the availability, integrity, and confidentiality of data in an organization's information technology (IT) system. It will be of interest to information resource managers, computer security officials, and administrators, and of particular value to those trying to establish computer security policies. The methodology offers a systematic approach to this important task and, as a final precaution, also involves establishing contingency plans in case of a disaster.
Data in an IT system is at risk from various sourcesuser errors and malicious and non-malicious attacks. Accidents can occur and attackers can gain access to the system and disrupt services, render systems useless, or alter, delete, or steal information.
An IT system may need protection for one or more of the following aspects of data:
· Confidentiality. The system contains information that requires protection from unauthorized disclosure. Examples: Timed dissemination information (for example, crop report information), personal information, and proprietary business information.
· Integrity. The system contains information that must be protected from unauthorized, unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems.
· Availability. The system contains information or provides services that must
security, attack, policies, should, attacks, information, vulnerabilities, system, strategy, damage, controls, plan, contingency, possible, data, threats, systems, proactive, computer, team, procedures, access, various, type, server, organization, threat, taken, minimize, determine, administrator, steps, response, recovery, methods, incident

