How the CIA Triad can Protect the Organization’s Information? (Coursework Sample)
How the CIA triad can protect the organization’s information (using your own words)?
List and discuss at least four factors that could threaten data integrity (using your own word).
The organization is required to revise its information security policies at a minimum annually. In your words, explain why and give an example to support your answer?
In your own words, explain why organizations need to evaluate their Information Security Policies? How this evaluation is conducted? And give two examples of the methods that can be used?
4603751146175Assignment 1Deadline: Tuesday 5/10/2021 @ 23:59[Total Mark for this Assignment is 5]00Assignment 1Deadline: Tuesday 5/10/2021 @ 23:59[Total Mark for this Assignment is 5]51181059055IT Security and PoliciesIT40900IT Security and PoliciesIT409
-12954004483735Instructions:You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.It is your responsibility to check and make sure that you have uploaded both the correct files.Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).Email submission will not be accepted.You are advised to make your work clear and well-presented. This includes filling your information on the cover page.You must use this template, failing which will result in zero mark.You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.Late submission will result in ZERO mark.The work should be your own, copying from students or other resources will result in ZERO mark.Use Times New Roman font for all your answers. 00Instructions:You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.It is your responsibility to check and make sure that you have uploaded both the correct files.Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).Email submission will not be accepted.You are advised to make your work clear and well-presented. This includes filling your information on the cover page.You must use this template, failing which will result in zero mark.You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.Late submission will result in ZERO mark.The work should be your own, copying from students or other resources will result in ZERO mark.Use Times New Roman font for all your answers. 4603753223895Student Details:Name: ###CRN: ###ID: ###1282000Student Details:Name: ###CRN: ###ID: ###
419343816751811.5 Marks001.5 Marks5900458470topLearning Outcome(s):LO1: Apply effective, proper, and state-of-the-art security tools and technologies.2500095000Learning Outcome(s):LO1: Apply effective, proper, and state-of-the-art security tools and technologies.Question One
How the CIA triad can protect the organization’s information (using your own words)?
Through the Confidentiality, Integrity, and Availability principles the triad helps to ensure sensitive information is prevented from unauthorized access, the data is correct, authentic and reliable and most importantly, it ensures systems, applications and data are available and accessible to authorized users only when they need them. The model is designed to guide policies for information security within an organization.
419481014703551 Marks001 Marks470840-1270Learning Outcome(s):LO1: Apply effective, proper, and state-of-the-art security tools and technologies.2500095000Learning Outcome(s):LO1: Apply effective, proper, and state-of-the-art security tools and technologies.Question Two
List and discuss at least four factors that could threaten data integrity (using your own word).
Data integrity ensures that information is only accessed or modified by those authorized to access the system. Integrity of data can be compromised in different ways including;
Human error- Human error is unintentional in most of the time. However, when human errors are added deliberately, it ends up to data integrity problems. Once found, documentation errors should be corrected according to specific procedures. If the procedures are not followed, data integrity is compromised.
Malware, insider threats, and cyber-attacks - Data can be an easy target for manipulation by external attackers or insiders to strategic or tactical effect. Most of the attacks are the result of lack of analytical security systems in place.
Compromised hardware - Compromised hardware such as devices or disk crash could result to compromised integrity. For instance when a disc crushes or gets lost, the data saved there would not be readily available to the users.
Unintended transfer errors- Data integrity could be compromised through transfer to a wrong address or when the file was being transferred between two devices and it fell under the wrong hands. This way, the data is no longer useful to the organization.
419343814703551 Marks001 Marks470865-5080Learning Outcome(s):LO3: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocols2500095000Learning Outcome(s):LO3: Develop security policies and put in place an effective security architecture that comprises modern hardware and software technologies and protocolsQuestion Three
The organization is required to revise its information security policies at a minimum annually. In your words, explain why and give an example to support your answer?
Security policies are clear, comprehensive, and well-defined practices, rules, and plans that regulate access to the organization's system and the information included in it. Good policy protects information, systems, and individual employees and the organization as a whole.
Reviewing the policies helps the organization understand what it has undergone over the past year, the
Other Topics:
- Understanding Basic Cloud Computing Terms and CasesDescription: Platform as a Service is a cloud computing model that involves with the provision of hardware entities and software resources to users to enable them build and implement applications on the cloud platform. The model is evident both for the Windows operating systems and the linux-based solutions. List the ...2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Coursework |
- An Investigation on Mobile Cloud Computing Concepts and TaxonomyDescription: Mobile cloud computing (MCC) is a highly discussed topic attracting a range of participants in software development. Organizations such as Google, Apple, and Microsoft have entered the development of these cloud services. A majority of these ...7 pages/≈1925 words| 12 Sources | APA | IT & Computer Science | Coursework |
- The Process of Saving a Word DocumentDescription: At the point when you start Word without opening a current document, the program gives you an unfilled one to work in. In the event that you're anxious to put words to page, type away. Sometime, however, you'll need to begin another new form of document. The process saving a document includes;...1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Coursework |