Confidentiality, integrity and accessibility: security key elements
Date: June 07, 2004Source: Computer Crime Research Center
By:
Increased popularity of the Internet, in particular, for commercial and communication purposes extended companies' capabilities to develop new systems of delivery, to use global human resources more efficiently. These opportunities introduced additional requirements from a point of security: continuous business activity and emergency management; these global technologies may lead to global threats. Security tasks develop in intensity and complicity directions.
By 2005, 60 percent of security breach incident costs incurred by businesses will be financially or politically motivated, according to Gartner, Inc. (NYSE: IT and ITB). Most of these financial losses will be the work of insiders working alone or in conspiracy with outsiders.
According to "The Fortune" magazine annual financial losses caused by computer crime may go up to $10 billion.
Surveys in the US illustrate that probability that companies' computers may be infected with viruses increased by more than 15% last years.
Hence nowadays each corporate network should have clear security policy. This policy is elaborated on the basis of risks analysis and defining critical resources and threats. Base elements of such policy are: identification, integrity and energetic examination. Identification is to prevent unauthorized access to resources and data threats. Integrity maintains protection from data listening-in and manipulating, confidentiality and invariability of transmitted information. Energetic examination (audit) means examining of accuracy of security policy realization and it helps to detect unauthorized intrusion into networks and DoS attacks.
Systems' security assurance is a continuous process where new methods, means and technologies should be used. Scales of information cooperation through the Internet is related to activities of millions of enterprises and individuals; protection of their interests is a national level task.
Add comment Email to a Friend
Discussion is closed - view comments archieve |
2005-09-02 08:28:46 - Very nice blog. Milen |
2004-06-07 15:33:55 - What was the point of this "blurb". Had... Seymour Butts |
2004-06-07 15:32:33 - What was the point of this "blurb". Had... Seymour Butts |
Total 3 comments |