What 3 elements does any effective information security require?
What will be an ideal response?
An effective information security program relies upon the three elements, known as the
CIA triad or model that uses the goals of confidentiality, integrity, and availability to ensure
information systems security. These are considered the three most important goals of information security, and they apply to both cyber and physical forms of information. First,
confidentiality addresses keeping data private, allowing its access to authorized persons only.
To keep data private, organizations will have rules and restrictions to ensure that information is
accessible only to those authorized to have it and there is no loss of confidentiality. Integrity ,
meanwhile, is that an organization has processes to ensure that information is not modified,
destroyed, or altered in some manner from storage and transfer. For example, one common
issue that may arise is the unauthorized modification of software that can result in a malicious
software attack on the organization’s information system. Next is availability . The objective of
availability is to ensure that information is available to all authorized users.
You might also like to view...
Statutory rape is:
a. sexual intercourse under threat of force. b. the rape of a spouse. c. any sex act that violates a state statute. d. sexual intercourse with a minor.
Once a grand jury is convened, the members serve for an indefinite period of time
a. True b. False
Solitary confinement of a prisoner would be considered a _______ of the prisoner resulting from bad behavior
Fill in the blank(s) with correct word
The _________ is the body of appointed civilians that decides if an inmate should be granted conditional release
Fill in the blank(s) with correct word