Unit IV Last Two Questions
Unit IV Last Two Questions
Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith
in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions.
Availability:
Availability is referring to the ability to access information or resources in a specified location and in the correct
format. When a system is regularly not functioning, information and data availability is compromised and it will affect the
users. Besides functionality, another factor that effects availability is time. If a computer system cannot deliver
information efficiently, then availability is compromised again.
Utility:
Utility refers to something that is useful or designed for use. Normally, utility is not considered a pillar in
information security. To preserve utility of information, we should require mandatory backup copies of all critical
information and should control the use of protective mechanisms such as cryptography.
Integrity:
In the context of computer systems, integrity refers to methods of ensuring that the data is real, accurate and
guarded from unauthorized user modification. Data integrity is a major information security component because users
must be able to trust information.
Untrusted data compromises integrity. Stored data must remain unchanged within a computer system, as well as
during transport. It is important to implement data integrity verification mechanisms such as checksums and data
comparison.
Authenticity:
Regarding computer systems, authenticity or authentication refers to a process that ensures and confirms the
user’s identity. The process begins when the user tries to access data or information. The user must prove access rights
and identity. Commonly, usernames and passwords are used for this process. However, this type of authentication can be
overcome by hackers. A better form of authentication is biometrics, because it depends on the user’s presence and
biological features.
Confidentiality:
Confidentiality means allowing authorized users to access sensitive and protected information. Sensitive
information and data should be disclosed to authorized users only. The user must obtain certain clearance level to access
specific data or information. Confidentiality can be ensured by using role-based security methods to ensure user or viewer
authorization (for example, define user to read but not write data).
Nonrepudiation:
Nonrepudiation refers to a method of guaranteeing message transmission between parties using digital signature
and/or encryption. Proof of authentic data and data origination can be obtained by using a data hash, but the method is not
100 percent effective. Nonrepudiation can be achieved by using digital signatures to prove the delivery and receipt of
messages.