Thursday, June 13, 2019

Mid- Term Exam Assignment Example | Topics and Well Written Essays - 2500 words

Mid- Term Exam - Assignment ExampleIn addition, this security model largely emphasizes the security aspects of randomness technology and helps people in analyzing all those important aspects that pertain to the comprehensive and valuable features of nurture technology (Whitman and Herbert 1-250). The three major offices of the C.I.A triangle consist of Confidentiality, rectitude and Availability. Confidentiality It is considered as one of the most important components of this particular model as it solely emphasizes the aspect of procurement of valuable information and its prevention from acquiring shared to unauthorized personnel. Information technology is considered to be a vital aspect as it serves multiple purposes. All kinds of major transactions that take ass in todays scenario are mostly based online mode and there are many malicious internet users who are very effective in stealing and manipulating information that is highly restrictive (Whitman and Herbert 1-250). Inte grity It is also considered to be a vital aspect of this particular triangle as this component largely emphasizes the fortress of information along with preventing it from acquiring modified or even manipulated from any kind of unauthorized users which may prove to disrupt the information sharing process (Whitman and Herbert 1-250). ... to be the most important aspect in the field of information technology as it widely emphasizes the all-encompassing aspect of protection of information along with ensuring unauthorized access. It also facilitates to prevent revelation or disruption of the information to unwanted individuals. The two key concepts of information security basically include IT security and Information assurance. IT security relates to ensuring graceful security to the computers and all its components. Similarly, information assurance relates to the procurement of information and prevention of the valuable data from getting lost or being manipulated. However, both of these concepts have greater significance in relation to the triangle, especially in the modern day technological setting as these concepts along with the components of C.I.A aim at a basic objective i.e. to ensure all round security in matters pertaining to information technology and its proper usage (Whitman and Herbert 1-250). Best example of information technology and utilization of the concepts of information security and components of C.I.A would be that it is utilized by IT specialists, corporations, hospitals, financial institutions, government and military among broad entities. The components are utilized with the prime objective of ensuring comprehensive and steadfast security regarding various types of business information that are processed and shared for various authenticate and business purposes (Whitman and Herbert 1-250). 2. DESCRIBE AN INFORMATION SECURITY POLICY. EXPLAIN WHY IT IS CRITICAL TO THE SUCCESS OF AN INFORMATION SECURITY PROGRAM Information security poli cies are indisputable documented business rules and regulations that are implemented for the sole purpose of storing and protecting information in an appropriate

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Implementation and Challenges of Lean Concept in Human resources Essay Example for Free

Usage and Challenges of Lean Concept in Human assets Essay Going lean is the discussion of the period. Practically all the large associat...