Importance of Information Availability, its effects on Business & the proposed Model

Authors

  • Bilal Alvi
  • M. Wasim Qureshi
  • Shakir Karim

DOI:

https://doi.org/10.33317/ssurj.75

Keywords:

Accessibility, Information availability, Information security, Reliability.

Abstract

Many a time the irony one can face is the unavailability of the resources when they are needed the most causing unavoidable/irreversible loss. These kinds of scenarios can cost organizations their business. Enterprises suffered and are still suffering a huge loss in terms of revenue, customers’ dissatisfaction and more.  Though availability is one of the three basic components of security besides Confidentiality and Integrity, it could not get its due share and remained under the back- drop. In this paper, the importance of the information availability and its key determinants are discussed, analyzed and a conceptual model is proposed. The model is validated by carrying out an in-depth study of three major multinational oil enterprises of Pakistan. The study proved that if information availability is taken care in true sense, success in business could be assured.

 

References

Jim Simmons, Integrating Continuity and Recovery with Information Security: Your Best Defense for Computer Infrastructures, SunGard Availability Services White Paper Series, (2003).

“Understanding the Fundamentals of Managed Availability”, Business continuity solution series, A vision solutions white paper (March 2004)

Tryfonas, T. Grilzalis, D. & Kokalakis, S. “ A quantitative approach to information availability”, proc. information security for global information infrastructure, IFIP TC11, Sixteenth annual working conference on information security, USA, 37-47 (2000)

Lampson, B.W. “Computer security in the real world”, Proc. the 16th Annual Computer Security Applications Conference, USA (2000). Available: http://acsac.org/invited-eassy/eassys/2000-lampson.pdf

M. Wasim Qureshi, “Information Availability Modeling on Enterprise Networks”

Generally Accepted System Security Principles (GASSP), International Information Security Foundation, Generally Accepted System Security Principles Committee (June, 1997).

Brinkley, D.L. & Schell, R.R, “Concepts and Terminology for Computer Society”, In M.D.Abrams, S. Jajodia & H.J. Podell (Eds.), Information Security: An integrated collection of eassys, 11-39. Los Alamitos, CA:IEEE Computer Society Press, (1995).

Mclean, J., Meadows, C., “The Future of Information Security”, Center for High Assurance Computer Systems, Naval Research Laboratory, Washington, DC, USA.

Information Security Guidelines for NSW Government, Part-2, Examples of Threats and Vulnerabilities, Office of Information and Communication Technology, Australia, (June, 2003).

Candea, G., “Principles of dependable computer systems – the basics”, Stanford University, USA, (September, 2003)

ISSO Glossary of INFOSEC and INFOSEC Related Terms, Vol. I (1996).

“Cisco Cable IP Solutions for High-Availability Networks”, Cisco System, Inc. (2003).

Enrique Vargas, “High Availability Fundamentals – Enterprise Engineering”, (November, 2000).

Tellis, W., “Introduction to case study”, The qualitative report, 3(2), (July, 1997).

Downloads

Published

2011-12-20

How to Cite

Alvi, B., Qureshi, M. W., & Karim, S. (2011). Importance of Information Availability, its effects on Business & the proposed Model. Sir Syed University Research Journal of Engineering & Technology, 1(1), 5. https://doi.org/10.33317/ssurj.75