What 3 elements does any effective information security require?

What will be an ideal response?


An effective information security program relies upon the three elements, known as the
CIA triad or model that uses the goals of confidentiality, integrity, and availability to ensure
information systems security. These are considered the three most important goals of information security, and they apply to both cyber and physical forms of information. First,
confidentiality addresses keeping data private, allowing its access to authorized persons only.
To keep data private, organizations will have rules and restrictions to ensure that information is
accessible only to those authorized to have it and there is no loss of confidentiality. Integrity ,
meanwhile, is that an organization has processes to ensure that information is not modified,
destroyed, or altered in some manner from storage and transfer. For example, one common
issue that may arise is the unauthorized modification of software that can result in a malicious
software attack on the organization’s information system. Next is availability . The objective of
availability is to ensure that information is available to all authorized users.

Criminal Justice

You might also like to view...

Statutory rape is:

a. sexual intercourse under threat of force. b. the rape of a spouse. c. any sex act that violates a state statute. d. sexual intercourse with a minor.

Criminal Justice

Once a grand jury is convened, the members serve for an indefinite period of time

a. True b. False

Criminal Justice

Solitary confinement of a prisoner would be considered a _______ of the prisoner resulting from bad behavior

Fill in the blank(s) with correct word

Criminal Justice

The _________ is the body of appointed civilians that decides if an inmate should be granted conditional release

Fill in the blank(s) with correct word

Criminal Justice