Professional Documents
Culture Documents
Assignment # 3
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of
concentration. Information security is concerned with the confidentiality, integrity and availability of
data regardless of the form the data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of a computer system
without concern for the information stored or processed by the computer.
1) Disclosure of information
2) Unauthorized access
3) illegal usage of confidential data
4) Disruption of data
5) Modification of important information
6) Perusalof data
7) Irritating Inspection of information
8) Recording of information
9) Destruction of highly valuable data
10) Loss of capital
1. Disclosure of information
This can be saved by making the information security checks like firewall, antivirus, proxy
policies and proper user rights management.
2. Unauthorized access
Unauthorized access can be cured by limiting user rights to the system.
4. Disruption of data
Proper backups and recovery procedures should be implemented
6. Perusal of data
Unauthorized access can be cured by limiting user rights to the system. Like patient’s data
should be available to only authorized doctors or physicians.
8. Recording of information
Again recording or encryption rights must be made to avoid this .