× Didn't find what you were looking for? Ask a question
  
  
Top Posters
Since Sunday
j
22
22
i
19
a
18
z
18
m
17
D
17
D
16
j
16
K
16
s
16
a
16
New Topic  
wrote...
Posts: 211
A week ago
What 3 elements does any effective information security require?
Textbook 
Introduction to Security: Operations and Management
Edition: 5th
Authors:
Read 44 times
1 Reply
Related Topics
Replies
wrote...
A week ago
An effective information security program relies upon the three elements, known as the CIA triad or model that uses the goals of confidentiality, integrity, and availability to ensure information systems security. These are considered the three most important goals of information security, and they apply to both cyber and physical forms of information. First, confidentiality addresses keeping data private, allowing its access to authorized persons only. To keep data private, organizations will have rules and restrictions to ensure that information is accessible only to those authorized to have it and there is no loss of confidentiality. Integrity , meanwhile, is that an organization has processes to ensure that information is not modified, destroyed, or altered in some manner from storage and transfer.  For example, one common issue that may arise is the unauthorized modification of software that can result in a malicious software attack on the organization's information system. Next is availability . The objective of availability is to ensure that information is available to all authorized users.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers.
Learn More
Improve Grades
Help Others
Save Time
Accessible 24/7
  144 People Browsing
Your Opinion
What percentage of nature vs. nurture dictates human intelligence?
Votes: 81

Previous poll results: Do you believe in global warming?
Related Images
 516
 134
 92