Goals and Practices in Maintaining Information Systems Security

Goals and Practices in Maintaining Information Systems Security

Zippy Erlich (The Open University of Israel, Israel) and Moshe Zviran (Tel-Aviv University, Israel)
Copyright: © 2010 |Pages: 11
DOI: 10.4018/jisp.2010070103
OnDemand PDF Download:
No Current Special Offers


With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization’s security lies in designing, developing and implementing proper information systems’ security policy that balances security goals with the organization’s needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
Article Preview

Main Goals Of Information Systems Security

There are various definitions of computer security; each views computer security from a different standpoint. Security professionals tend to define three interdependent information security goals: confidentially, integrity, and availability (CIA) (Solomon & Chapple, 2005).

Confidentially is the main goal of information security and refers to preventing confidential information from falling into the hands of unauthorized users. Access controls and encryption processes can prevent this.

Integrity refers to preventing unauthorized alteration and modification of data, either by unauthorized users such as hackers, or by authorized users making unauthorized modifications. Access controls prevent such modification of data by unauthorized users. In addition, to ensure integrity, a backup policy should be defined to protect against corruption or loss of data.

Complete Article List

Search this Journal:
Open Access Articles
Volume 16: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing