Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 3RQ
Explanation of Solution
CIA triad and its components:
- CIA triad defines the confidentiality, integrity, and availability of the data.
- The information can be secured through combination of CIA triad.
- Its components are explained as follows:
- Confidentiality:
- It makes sure that the key data is protected from the unauthorized users.
- For example,
- Only the authorized user should know the balance money in savings account
- Integrity:
- It ensures that the information can be modified only by the appropriate
mechanisms. ..
- It ensures that the information can be modified only by the appropriate
- Confidentiality:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
What is the most important phase of the SDLC, and can you support it with at least two circumstances or examples?
How do these three(CIA Triad) principles work together? Can you think of any situations where one of these could be considered more important than the other two?
Because NDCP is a membership cooperative, Dunkin' Donuts franchisees are both owners and customers. What might be some advantages to such an ownership structure in terms of getting the support of all stake holders for massive protection as the one NDCP undertook? What might be some disadvantages?
Chapter 1 Solutions
Management Of Information Security
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Assume that a security model is needed to protect...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 6ECh. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 1EDM
Knowledge Booster
Similar questions
- It is important to have a strategic strategy in the event that information centers want to automate part or all of their activities. Are you in agreement or disagreement? Give your reasoning.arrow_forwardWhat are some of the complaints that have been leveled against UEFI during the course of its existence? Which of the critiques that were presented earlier do you agree with, and which do you disagree with?arrow_forwardWhat have been some of the objections leveled against UEFI throughout the years? Which of the aforementioned critiques do you agree or disagree with?arrow_forward
- Assume the CFO of your organization approaches you to ask your advice about implementing the Balanced Scorecard at your organization. a) List and describe the four perspectives of the Balanced Scorecard. b) What steps would you encourage him or her to take in order to successfully implement the Scorecard? c) What roadblocks would you encourage him or her to avoid in order to successfully implement the Scorecard?arrow_forwardAssume that you are asked to recommend the professional credit credentials for certain roles in infosec at a large organization. What is your recommendation for the credentials to be held by the CISO? How about for an infosec manager? What would be your recommended certifications for the senior technical staff? For the last question, pick 3 technical roles and know the job title and recommended credentials for each.arrow_forwardC. List the components of PKI, then describe each component and its function. What are certification and accreditation when applied to information systems security management? List and describe at least two certification or accreditation processes. You've been hired by an investment company with 500 employees to serve as their Information Systems Security Manager. Your first task from the Chief Information Officer is to write a series of policies and procedures as the company has nothing in place. Where is a good place to start your research? List at least 3 policies and procedures that you would work on first and explain why these three should be considered early. Recommend a password policy. If the C.I.A. triangle is incomplete, why is it so commonly used in security? Explain what value an automated asset inventory system has for the risk identification process?arrow_forward
- What have been some of the critiques raised at UEFI throughout the years? Do you agree or disagree with the criticisms made here?arrow_forwardHow does the Cybercrime Conceptual Framework work? Your response should provide citations to the sources you consulted.arrow_forwardWhichever phase of the SDLC you believe to be the most important, explain your position with at least two examples or situations.arrow_forward
- What are a couple of instances or scenarios that could be employed to substantiate the assertion that this particular phase of the SDLC holds the utmost significance?arrow_forwardEach of the NCS's fourteen major objectives should get a detailed response.arrow_forwardImagine that you have been given the responsibility of serving as the JAD session's facilitator. If you were in charge of a JAD session, you should compile a list of 10 rules and regulations that you would want all of the participants to follow.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning