Information Security Advantages

911 Words2 Pages

Why Study Information Security? The study aims at providing knowledge on preventive measures against web attacks on computers, networks and the data stored in them. This security is also essential for protection against identity theft and the phishing of user information for financial gain, it will also equip an individual with the knowledge to help them differentiate and identify a genuine address from an address indicating fraud. The study of information security is also a career subject and has offered a large number of people’s jobs. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, …show more content…

Advantages
Confidentiality, Integrity and Availability (CIA)
CIA triad gives its users a very straightforward way to view, understand, contemplate, conceptualize and address problems that relate to information security. CIA triad is not so complex and can, therefore, be utilized by many smaller organizations that are only interested in the software security.
Parkerian Hexad (PH)
The Parkerian Hexad (PH) has many components of the CIA model, its added components offer a wide range of information security and complete model for securing the data today. As compared to CIA, PH has a wide coverage of utility and therefore can be adopted by big organizations. It also has most of the components of CIA making it a stronger system to utilize and can, therefore, be adopted by small organizations as well to strengthen their information security.PH does not only cover the software system but it also covers the hardware system which can be exposed to fraud and physical breaches. …show more content…

Protecting information while at rest and motion is a part of the concept adopted from the defense in depth. Information saved in our computer systems may be exposed to so many threats like transfer of data from the system using a flash drive. To ensure the information is safe and well protected from such an incidence certain layers should be put in place. The three layers that help to conceptualize defense id depth include people who form the outer layer, network security forming the second layer, host-based security, and application security forming the inner layers respectively. These layers are formed from three controls (administrative controls, logical controls, and physical controls) in which the concept of defense in depth is based

More about Information Security Advantages

Open Document