Friday, August 9, 2019
Mid- Term Exam Assignment Example | Topics and Well Written Essays - 2500 words
Mid- Term Exam - Assignment Example In addition, this security model largely emphasizes the security aspects of information technology and helps people in analyzing all those important aspects that pertain to the comprehensive and valuable features of information technology (Whitman and Herbert 1-250). The three major components of the C.I.A triangle consist of Confidentiality, Integrity and Availability. Confidentiality: It is considered as one of the most important components of this particular model as it solely emphasizes the aspect of procurement of valuable information and itââ¬â¢s prevention from getting shared to unauthorized personnel. Information technology is considered to be a vital aspect as it serves multiple purposes. All kinds of major transactions that take place in todayââ¬â¢s scenario are mostly based online mode and there are many malicious internet users who are very proficient in stealing and manipulating information that is highly restrictive (Whitman and Herbert 1-250). Integrity: It is al so considered to be a vital aspect of this particular triangle as this component largely emphasizes the protection of information along with preventing it from getting modified or even manipulated from any kind of unauthorized users which may prove to disrupt the information sharing process (Whitman and Herbert 1-250). ... to be the most important aspect in the field of information technology as it widely emphasizes the broad aspect of protection of information along with ensuring unauthorized access. It also facilitates to prevent revelation or disruption of the information to unwanted individuals. The two key concepts of information security essentially include IT security and Information assurance. IT security relates to ensuring proper security to the computers and all its components. Similarly, information assurance relates to the procurement of information and prevention of the valuable data from getting lost or being manipulated. However, both of these concepts have greater significance in relation to the triangle, especially in the modern day technological context as these concepts along with the components of C.I.A aim at a basic objective i.e. to ensure all round security in matters pertaining to information technology and its proper usage (Whitman and Herbert 1-250). Best example of informat ion technology and utilization of the concepts of information security and components of C.I.A would be that it is utilized by IT specialists, corporations, hospitals, financial institutions, government and military among broad entities. The components are utilized with the prime objective of ensuring comprehensive and steadfast security regarding various types of business information that are processed and shared for various authenticated and business purposes (Whitman and Herbert 1-250). 2. DESCRIBE AN INFORMATION SECURITY POLICY. EXPLAIN WHY IT IS CRITICAL TO THE SUCCESS OF AN INFORMATION SECURITY PROGRAM Information security policies are certain documented business rules and regulations that are implemented for the sole purpose of storing and protecting information in an appropriate
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.