The preservation of confidentiality: ensuring that information can only be accessed by those authorised to do so • Maintaining integrity: safeguarding the accuracy and completeness of information and that no unauthorised changes are made • Ensuring availability: ensuring that authorised parties can access to information when required. This definition is reflected in the international standard ISO 27000 and is widely used. Security practitioners have proposed additional components. In 2002, D.B. Parker proposed three additional elements: • Authenticity: ensuring that the parties in an electronic transaction are who they claim to be and that the components of the transaction are genuine. • Possession and Control: loss of possession and control of data creates the risk of loss of security. Example: a laptop computer forgotten and unrecovered at an airport security point. • Utility: the ability to use the information. For example suppose that encrypted data is provided to an individual together with the encryption key but the recipient loses the encryption key. The data remains available, authentic and confidential, it retains the original integrity and is in the intended person’s possession. But as it is not usable it has no utility. Electronic commerce added one more element: Non-Repudiation: The mechanism that ensures that a party to a transaction cannot deny having received a transaction and neither can the other party deny having sent it. 3.2. Differences between Enterprise security, Information security and Information Technology security The management of information security relies on three distinct areas of accountability. These are not always well linked or coordinated as their management is placed in different organisational structures which may not even talk to each other. These are shown in Figure 2
đang được dịch, vui lòng đợi..
