Incorporating cia triads into company cyber security

Assignment Help Basic Computer Science
Reference no: EM13829865

Problem:

Describe in detail an organization you are familiar with that is need of a security review. This could be a company you work for, a fictitious company, or an organization you are associated with. You will use this company and scenario throughout the class.

As the security analyst in charge of ensuring a solid security posture for the organization, describe the CIA triad with respect to information security, and describe how you would implement a security program for your chosen organization with each pillar of the triad in mind. Focus the discussion with the following questions in mind:

  • What would you do to protect the Confidentiality of company information?
  • What would you do to protect the Integrity of company information?
  • What would you do to protect the Availability of company resources?

Describe what you consider to be a secure infrastructure for the organization to enable the implementation of the ideas that were previously described with respect to the CIA triad. Focus the discussion on at least 3 different security domains with security concerns. (You can use the CISSP 10 domains as a basis)

Additional Information:

This problem is from Computer Science as well as it is about security review of fictitious company named ABC Inc. The security plan of ABC Inc. has been done. A security analyst of ABC Inc explains that the security of ABC Inc should incorporate the features of CIA which include Confidentiality, Integrity and Availability triads in relation to information security.

Total Word Limit: 841 Words

Reference no: EM13829865

Questions Cloud

Australian government on climate change in the recent years : Australian Government On Climate Change In the Recent Years
Discusses the discrimination based on religion : The question is an article summary and it is discusses the discrimination based on religion. This article focuses on events which happened in Indonesia where two brothers were convicted for helping convert Muslims to Christianity.
Cultural differences between the us and your chosen country : Research the culture of a country of your choice. In a two to three page paper, describe the key cultural differences between the U.S. and your chosen country
Utilizing paper or plastic in the retail market : The debate between utilizing paper or plastic in the retail market has and will always be around. The majority of grocery stores offer you the choice of paper or plastic, and some stores are even moving towards a more environmental friendly reusable ..
Incorporating cia triads into company cyber security : Describe in detail an organization you are familiar with that is need of a security review. This could be a company you work for, a fictitious company, or an organization you are associated with. You will use this company and scenario throughout t..
What system factors influence organizational performance : What system factors influence organizational performance? How do accreditation standards or government regulations guide performance and process design
Optimal objective functional value of linear programming : You need to describe the problem considered for your project and propose a model and/or solution approach for solving the problem using decomposition techniques discussed in class
Explains the relationships between students and teachers : The question is an article summary that explains the relationships between students and teachers, particularly sexual relationships. The summary and the analysis clarify the implications of sexual relationship between students and teachers/.
Critical importance of it in company strategy : For this assignment you will have to prepare a paper that critically discusses how organizations apply the strategic use of IS/IT to achieve competitive advantage. Some aspects and issues you may discuss in your paper could include (but are not li..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Issues information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc...

  Which technology half or full duplex has a lower effective

Which technology (half or full duplex) has a lower effective throughput rate

  Describing fields and options with user account set-up

Describe the fields and options associated with user account set-up.

  Write a c++ program for encrypting and decrypting files

Write a C++ program for encrypting and decrypting files. Since this program performs two different functionalities (encryption and decryption), prompt the user to select the type of cryptographic technique as shown below.

  Ethernet used for enterprise access

Ethernet used for Enterprise Access

  Find the sum of a fibonacci series upto n terms

Find the sum of a Fibonacci series upto n terms, where n is the input of a Matlab program using for loop. First term i.e. F1=1 and Second term F3=1.uestion here

  System administrator at sls happened to read the details

Suppose a system administrator at SLS happened to read the details of this case. What steps should he or she take to improve the company's information security program?

  Write a program that creates a binary tree from an array

Write a program that creates a Binary Tree from an array of integers, goes through it using inorder traversal (saving that to another array), then makes another balanced binary tree.

  Return true if sum of all array elements greater than sum

public boolean sumGreaterThan(double[] array, double sum) Given a filled array of double array elements, return true if the sum of all array elements is greater than sum. The array may be empty.

  Write a loop that subtracts one from the class

1- Write a loop that subtracts one from the Class Dog's energy for every 30 steps that the Dog takes. 2- Make the player-controlled Class Dog move more slowly whenever the method isTired returns a value of true.

  What is a value chain

What is a value chain? Distinguish between primary and secondary components and provide some examples

  Simulate the operation of a simple robot

Write a program to simulate the operation of a simple robot . the robot moves in four directions :forward, right,left. the job of the robot is to move items and place it in the right slots in each station

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd