Principles of Information Security
Price: $250.95 - $99.00
(as of Dec 02,2024 06:37:58 UTC – Details)
From the Publisher
Don’t overspend on your course materials with Cengage Unlimited
Don’t overspend
Need more than one Cengage eTextbook or online homework platform?
Save on Cengage course materials
With Cengage Unlimited you can save and get access to the entire Cengage eTextbook library
Get Cengage Unlimited
Save money and simplify access to your course materials with Cengage Unlimited
What you get with Cengage Unlimited
Instant access to the eTextbook for your class and our full online libraryAll your Cengage online homework platforms like MindTap, WebAssign, SAM, OpenNow, CNOWv2, OWLv2 and Cengage InfuseFlexibility to read and listen to your eTextbooks offline and on the go with the Cengage mobile appAt least 4 hardcopy textbooks rentals – just pay S&H each, available within the 50 statesTips and tools to help you succeed in college and your career
ASIN : 1337102067
Publisher : Cengage Learning; 6th edition (March 13, 2017)
Language : English
Paperback : 656 pages
ISBN-10 : 9781337102063
ISBN-13 : 978-1337102063
Item Weight : 2.31 pounds
Dimensions : 7.25 x 1.25 x 9 inches
Customers say
Customers find the text quality great, easy to navigate, and highlighting key words. Opinions differ on the information content, with some finding it comprehensive and helpful for learning about the topic, while others say it’s boring and overwhelming.
AI-generated from the text of customer reviews
Principles of Information Security
Information security is a critical aspect of any organization, ensuring that sensitive data is protected from unauthorized access, disclosure, alteration, or destruction. To establish effective information security practices, it is essential to adhere to the following principles:
1. Confidentiality: This principle ensures that sensitive information is only accessible to authorized individuals or entities. Measures such as encryption, access controls, and data classification help maintain confidentiality.
2. Integrity: Integrity ensures that data is accurate, complete, and trustworthy. Implementing measures such as data validation, checksums, and digital signatures help prevent unauthorized alterations to data.
3. Availability: Availability ensures that information and resources are accessible to authorized users when needed. Implementing redundancy, backups, and disaster recovery plans help maintain availability in the event of system failures or attacks.
4. Authentication: Authentication ensures that individuals or entities are who they claim to be before granting access to sensitive information. Implementing strong authentication methods such as passwords, biometrics, and multi-factor authentication help prevent unauthorized access.
5. Authorization: Authorization ensures that individuals or entities have the necessary permissions to access specific information or resources. Implementing role-based access controls and least privilege principles help prevent unauthorized access to sensitive data.
6. Accountability: Accountability ensures that individuals or entities are held responsible for their actions related to information security. Implementing audit logs, monitoring tools, and incident response plans help track and address security incidents effectively.
By adhering to these principles of information security, organizations can establish a robust security posture to protect their sensitive data and mitigate the risks of cyber threats and attacks.
#Principles #Information #Security