Biology Forums - Study Force

Other Fields Homework Help Management Topic started by: dillon_green23 on Aug 11, 2019



Title: What 3 elements does any effective information security require?
Post by: dillon_green23 on Aug 11, 2019
What 3 elements does any effective information security require?


Title: What 3 elements does any effective information security require?
Post by: wasan on Aug 11, 2019
An effective information security program relies upon the three elements, known as the CIA triad or model that uses the goals of confidentiality, integrity, and availability to ensure information systems security. These are considered the three most important goals of information security, and they apply to both cyber and physical forms of information. First, confidentiality addresses keeping data private, allowing its access to authorized persons only. To keep data private, organizations will have rules and restrictions to ensure that information is accessible only to those authorized to have it and there is no loss of confidentiality. Integrity , meanwhile, is that an organization has processes to ensure that information is not modified, destroyed, or altered in some manner from storage and transfer.  For example, one common issue that may arise is the unauthorized modification of software that can result in a malicious software attack on the organization's information system. Next is availability . The objective of availability is to ensure that information is available to all authorized users.