× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
5
o
5
4
m
4
b
4
x
4
a
4
l
4
t
4
S
4
m
3
s
3
New Topic  
dillon_green23 dillon_green23
wrote...
Posts: 492
4 years ago
What 3 elements does any effective information security require?
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 64 times
1 Reply

Related Topics

Replies
wrote...
4 years ago
An effective information security program relies upon the three elements, known as the CIA triad or model that uses the goals of confidentiality, integrity, and availability to ensure information systems security. These are considered the three most important goals of information security, and they apply to both cyber and physical forms of information. First, confidentiality addresses keeping data private, allowing its access to authorized persons only. To keep data private, organizations will have rules and restrictions to ensure that information is accessible only to those authorized to have it and there is no loss of confidentiality. Integrity , meanwhile, is that an organization has processes to ensure that information is not modified, destroyed, or altered in some manner from storage and transfer.  For example, one common issue that may arise is the unauthorized modification of software that can result in a malicious software attack on the organization's information system. Next is availability . The objective of availability is to ensure that information is available to all authorized users.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1191 People Browsing
Related Images
  
 1066
  
 1128
  
 2433
Your Opinion
Which industry do you think artificial intelligence (AI) will impact the most?
Votes: 308