Information Systems Security Essay examples

1923 Words 8 Pages
Hardware, software and the data that resides in and among computer systems must be protected against security threats that exploit vulnerabilities. Organizations must therefore impose appropriate controls to monitor for, deter and prevent security breaches. Three areas have been considered, in a typical sense, as the basic critical security requirements for data protection: confidentiality is used to assure privacy; principles of integrity assure systems are changed in accordance with authorized practices; and, availability is applied to maintain proper system functions to sustain service delivery (Dhillon, 2007, p. 19).
These security requirements are represented in Figure 1, Classic Critical Security Requirements. This figure depicts
…show more content…
Types of Nonrepudiation Controls
Asymmetric ciphers make public keys widely available for encrypting information, but only one individual possesses a private key to decrypt or decipher that information, and vice versa. Asymmetric cryptography, invented by Diffie and Hellman in 1975, can be used to authenticate a source such as a digital signature. RSA, named for Rivest, Shamir, and Adleman who first described this process and make it public, is an example of an asymmetric cipher algorithm. RSA uses a public key, available to everyone for encrypting messages. RSA then applies a limited-availability private key for decryption by the end user as represented in Figure 3 below.
Secure Socket Layer (SSL) encryption technologies also offer controls for non-repudiation to provide communications and data security over the internet. SSL uses asymmetric cryptography for privacy as well as keyed message authentication for message reliability. A Trusted Third Party (TTP) is often used for authentication in order to successfully implement non-repudiation controls. Just as a notary public will validate a signature, SSL certificates validate a user's transactions on the internet. Figure 4 below depicts two users making a data transaction across the internet.
This representation demonstrates data sent from User #1 and User #2 through the…

Related Documents