dq6

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

373

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

1

Uploaded by NadiaP6

Report
Differentiate between confidentiality, integrity and availability as it relates to informational security of an organization Protecting the information from prying eyes, both inside and outside the company, is essential to maintaining its secrecy. Ensuring that workers have the right clearance and authorization to access the information is a critical component of protecting confidentiality. At this stage, ISSMs provide the right kinds of privileges. Data integrity refers to how reliable the information is. Guaranteeing the integrity, accuracy, and reliability of the data at all times, both during transmission and storage, by preventing tampering. Encryption and digital certificates are two examples of security techniques that help keep data intact. Availability means that authorized users may access the data whenever they need to, regardless of the network's operating state. Without access, data is useless to those who need it. Now is the time to implement improvements to both hardware and software in order to guarantee availability. Data backups and redundant information systems guarantee that data is accessible whenever required. In our highly linked society, several institutions, both public and private, face difficulties on occasion. What makes an information system CIA-compliant are its levels of secrecy, authenticity, and accessibility. This week in class, we learned about some information system maintenance best practices for security. There are two sides to keeping the CIA Triad for any kind of information system in good working order. On one hand, we have the security manager, who is responsible for screening and hiring staff, as well as for providing them with training and making sure the building's physical security measures can back up and protect the networks. In contrast, the ISSM will be in charge of the more technical parts of safeguarding the systems and the network. Upgrading gear, monitoring software, backing up data, and making sure firewalls and Demilitarized Zones (DMZs) are in place to secure the organization's internal LAN are all tasks that would fall within the purview of the ISSM and his or her team of technicians. References Fortinet. (n.d.). What is the CIA Triad and Why is it important? Retrieved July 13, 2022, fromhttps://www.fortinet.com/resources/cyberglossary/cia-triad#:%7E:text=The%20three %20letters%20in%20%22CIA,and%20methods%20for%20creating%20solutions. Wayland, B. A. (2014). Security for Business Professionals: How to Plan, Implement, and Manage Your Company's Security Program (1st ed.). Butterworth-Heinemann.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help