Incorporating cia triads into company cyber security

Assignment Help Basic Computer Science
Reference no: EM13829865

Problem:

Describe in detail an organization you are familiar with that is need of a security review. This could be a company you work for, a fictitious company, or an organization you are associated with. You will use this company and scenario throughout the class.

As the security analyst in charge of ensuring a solid security posture for the organization, describe the CIA triad with respect to information security, and describe how you would implement a security program for your chosen organization with each pillar of the triad in mind. Focus the discussion with the following questions in mind:

  • What would you do to protect the Confidentiality of company information?
  • What would you do to protect the Integrity of company information?
  • What would you do to protect the Availability of company resources?

Describe what you consider to be a secure infrastructure for the organization to enable the implementation of the ideas that were previously described with respect to the CIA triad. Focus the discussion on at least 3 different security domains with security concerns. (You can use the CISSP 10 domains as a basis)

Additional Information:

This problem is from Computer Science as well as it is about security review of fictitious company named ABC Inc. The security plan of ABC Inc. has been done. A security analyst of ABC Inc explains that the security of ABC Inc should incorporate the features of CIA which include Confidentiality, Integrity and Availability triads in relation to information security.

Total Word Limit: 841 Words

Reference no: EM13829865

Questions Cloud

Australian government on climate change in the recent years : Australian Government On Climate Change In the Recent Years
Discusses the discrimination based on religion : The question is an article summary and it is discusses the discrimination based on religion. This article focuses on events which happened in Indonesia where two brothers were convicted for helping convert Muslims to Christianity.
Cultural differences between the us and your chosen country : Research the culture of a country of your choice. In a two to three page paper, describe the key cultural differences between the U.S. and your chosen country
Utilizing paper or plastic in the retail market : The debate between utilizing paper or plastic in the retail market has and will always be around. The majority of grocery stores offer you the choice of paper or plastic, and some stores are even moving towards a more environmental friendly reusable ..
Incorporating cia triads into company cyber security : Describe in detail an organization you are familiar with that is need of a security review. This could be a company you work for, a fictitious company, or an organization you are associated with. You will use this company and scenario throughout t..
What system factors influence organizational performance : What system factors influence organizational performance? How do accreditation standards or government regulations guide performance and process design
Optimal objective functional value of linear programming : You need to describe the problem considered for your project and propose a model and/or solution approach for solving the problem using decomposition techniques discussed in class
Explains the relationships between students and teachers : The question is an article summary that explains the relationships between students and teachers, particularly sexual relationships. The summary and the analysis clarify the implications of sexual relationship between students and teachers/.
Critical importance of it in company strategy : For this assignment you will have to prepare a paper that critically discusses how organizations apply the strategic use of IS/IT to achieve competitive advantage. Some aspects and issues you may discuss in your paper could include (but are not li..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Estimate benefit of a revenue-generating system

Is management able to estimate the benefit of a revenue-generating system or must the system be built on faith? Why?

  Translate the following function into mips assembly language

Translate the following function into MIPS assembly language

  Design and test in logic works

Design and test in Logic works

  Importance of first designing a program using an algorithm

Programs must be very thoroughly designed before they are written. In this assignment, you will discuss the importance of first designing a program using an algorithm, pseudocode, and flowcharts before writing the actual code.

  File contains data for an individual wedding album

Each line of this file contains data for an individual wedding album and delivery. These data  are used to determine the total cost of producing and posting a batch of albums to a  customer. Each column of this file contains values for the following..

  A sporting goods store ships a lot of baseballs

A sporting goods store ships a lot of baseballs. They only have one size shipping-box. Twenty-four baseballs will fill a shipping-box. Produce the pseudocode logic for an algorithm that will compute the number of shipping-boxes required for th..

  Efficiency and effectiveness metrics

Choose any of the Perspective boxes in this chapter or the opening case. Then, identify and describe at least seven metrics that could be used to measure the success of the IT systems in your chosen example. For each metric, categorize it as eit..

  Understanding of the effectiveness of maintenance

What types of measurements must be taken to gain an understanding of the effectiveness of maintenance. Why is tracking "mean time," between failures, an important measurement.

  Different software packages to different departments

Did you explain how they would deploy different software packages to different departments?

  Research paper on the von neumann machine

Write a 2 page research paper on the Von Neumann machine. Use at least two resources (Wikipedia sources are not permitted) and list each resource used at the end of the paper in the reference list section.

  Explain why its difficult to support direct assess to files

explain why its difficult to support direct assess to files with variable length records. suggest a method for handling this type of file if direct access is required.

  Modules in c are called functions

Modules in C are called functions. C programs are typically written by combining user-created functions as well as "pre-packaged" functions found in the C Standard Library. For instance, printf() is a function that is found in the C Standard Library ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd