Information Security Goals: Enable Use, Bar Intrusion


To secure information assets, organizations must open availability to legitimate users while barring unauthorized access. In general, secure systems must provide the following protections:

Accountability: Detect attacks in progress or trace any damage from successful attacks. Prevent system users from later denying completed transactions.

Availability: Ensure uninterrupted service to authorized users. Service interruptions can either be accidental or maliciously caused by denial-of-service attacks.

Confidentiality: Safeguard user privacy[3] and prevent the theft of information both stored and in transit.

Integrity: Ensure that electronic transactions and data resources are not tampered with at any point, either accidentally or maliciously[1].

To provide the four preceding key protections, information security must be an integral part of system design and implementation.

[3]Vacca, John R., Net Privacy: A Guide to Developing & Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill Trade, 2001.




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net