Security in IT Infrastructure What Essay

Total Length: 685 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2



A system possesses authenticity when the information retrieved is what is expected by the user -- and that the user is correctly identified and cannot conceal his or her identity. Methods to ensure authenticity include having user names and secure passwords, and even digital certificates and keys that must be used to access the system and to prove that users 'are who they say they are.' Some highly secure workplaces may even use biological 'markings' like fingerprint readers (Introduction, 2011, IBM).

Accountability means that the source of the information is not anonymous and can be traced. A user should not be able to falsify his or her URL address or email address, given the requirements of the system. "Non-repudiation is a property achieved through cryptographic methods which prevents an individual or entity from denying having performed a particular action related to data... Through the use of security-related mechanisms, producers and consumers of data can be assured that the data remains trustworthy across untrusted networks such as the internet, and even internal intranets" (Introduction, 2011, IBM). Non-repudiation ensures that there is a 'trail' left by all actions performed by the user, and if there is a breach of security, that breach can be rectified by retracing the steps of the user.

Compromised security can result in devastating consequences of businesses and individuals.
"You are more than used to protecting your home, car and other valuables from any theft or damage," and personal information online is of equal importance (Why is information security important, 2011, Security Extra). In the information age, knowledge is power -- for good or for ill. It can give business a legitimate competitive advantage or it can illegally take away a carefully built credit score when a consumer's identity is stolen......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security In IT Infrastructure What" (2011, September 27) Retrieved May 4, 2024, from
https://www.aceyourpaper.com/essays/security-infrastructure-45829

Latest MLA Format (8th edition)

Copy Reference
"Security In IT Infrastructure What" 27 September 2011. Web.4 May. 2024. <
https://www.aceyourpaper.com/essays/security-infrastructure-45829>

Latest Chicago Format (16th edition)

Copy Reference
"Security In IT Infrastructure What", 27 September 2011, Accessed.4 May. 2024,
https://www.aceyourpaper.com/essays/security-infrastructure-45829