Computer security formation
When we talk of computer security in any gathering, we are looking at the security of information that we have stored on the computer. That means those data are free from external attack.
Before you can say that a computer is secured, there are some factors that must be present. It must have some attributes. If anyone of them is missing, that means the computer is not secured. It is as simple as that.
Without wasting time, here are the five elements of a good security system. I do hope that you will examine your security system and make the adjustment. It is not too late to do the right thing.
Now, let’s look at the elements together…
When we talk of confidentiality in security, it has to do with ensuring that information is assessable only to those authorized to have access.
This is contained in ISO 17799. It entails setting up access and security level that prevents an unauthorized person from having access to information.
authenticity in computer security formation
The principle of authenticity is the identification and assurance of the origin of information. Here, you are sure that the information actually comes from the right source. You do not have to doubt the sender with this protocol in place.
Also, when talking about integrity in security, it has to do with ensuring that the information is accurate, complete, and reliable and is in its original form.
This guarantees that the information has not been tampered with in the process of transmission.
availability in computer security formation
In addition, the principle of availability is about ensuring that the information is assessable to authorized persons when required without delay.
There is nothing that must prevent the authorized person from having the information. In order for this to be available, the person must be able to provide the necessary credentials.
non-repudiation in computer security formation
Furthermore, under the principle of non-repudiation, the sender of the information cannot deny that he was not the one that sent the information.
This is possible because the information will always contain their credentials. As long as it has that, the sender cannot say he has not sent the information.
If you enjoy our article, sign up to get our next article in your inbox.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.
PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.