Management Of Information Security
6th Edition
ISBN: 9781337671545
Author: WHITMAN
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 3RQ
Explanation of Solution
CIA triad and its components:
- CIA triad defines the confidentiality, integrity, and availability of the data.
- The information can be secured through combination of CIA triad.
- Its components are explained as follows:
- Confidentiality:
- It makes sure that the key data is protected from the unauthorized users.
- For example,
- Only the authorized user should know the balance money in savings account
- Integrity:
- It ensures that the information can be modified only by the appropriate
mechanisms. ..
- It ensures that the information can be modified only by the appropriate
- Confidentiality:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Because NDCP is a membership cooperative, Dunkin' Donuts franchisees are both owners and customers. What might be some advantages to such an ownership structure in terms of getting the support of all stake holders for massive protection as the one NDCP undertook? What might be some disadvantages?
Write a thorough analysis of each of the NCS's fourteen major programmes.
How well does the SDLC use the wide variety of models at its disposal?
Chapter 1 Solutions
Management Of Information Security
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Assume that a security model is needed to protect...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 6ECh. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 1EDM
Knowledge Booster
Similar questions
- What have been some of the objections leveled against UEFI throughout the years? Which of the aforementioned critiques do you agree or disagree with?arrow_forwardC. List the components of PKI, then describe each component and its function. What are certification and accreditation when applied to information systems security management? List and describe at least two certification or accreditation processes. You've been hired by an investment company with 500 employees to serve as their Information Systems Security Manager. Your first task from the Chief Information Officer is to write a series of policies and procedures as the company has nothing in place. Where is a good place to start your research? List at least 3 policies and procedures that you would work on first and explain why these three should be considered early. Recommend a password policy. If the C.I.A. triangle is incomplete, why is it so commonly used in security? Explain what value an automated asset inventory system has for the risk identification process?arrow_forwardWhat are some of the most vital aspects of OOP that need to be discussed, although briefly?arrow_forward
- Information security program development and implementation is not a simple process, but it is an absolutely essential and on-going process; particularly if your organization is responsible for maintaining the integrity, availability, and confidentiality of customer information or business-critical data. Explain TWO approaches with the help of a valid diagram to Information Security Implementation in any organization.arrow_forwardAccording to the OSI reference model, seven are required, but this is not always the case. Why attempt to use fewer layers if it is not necessary? Exists any risk in employing fewer management levels?arrow_forward1. What are the issues with global information system management? To what extent does this hold true for Asian countries? What options do we have in this situation?arrow_forward
- How exactly should the information security policy of a corporation be translated into a project plan so that it may be put into action?arrow_forwardDescribe one benefit for creating a proper OU design. Be specific, and think in terms of Group Policy, Delegation of control, Access to resources and related efficiency, Security, or any other Administrative or IT Infrastructure factor.arrow_forwardA. What conditions must be met to ensure that risk acceptance has been used properly? B. Discuss the concept of an organisation’s competitive advantage against competitors and how it has evolved over the years with the ongoing development of the IT industry. C. Explain why networking components need more examination from an information security perspective than from a systems development perspective. Why must this practice be periodically reviewed? D. With the aid of a diagram, discuss the contingency planning hierarchy. E. What is the DMZ? Discuss whether this is a good name for the function that this type of subnet performs.arrow_forward
- Moving from on-premise to an IaaS design, what governance issues should be kept in mind?arrow_forwardIf technology is moved from on-premises to IaaS, governance problems could arise, but how?arrow_forwardWhat are two examples or circumstances that you might use to support the claim that this specific SDLC phase is the most important?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning