Question

In: Computer Science

Identify three major laws and how they relate to Information security describe them in detail

Identify three major laws and how they relate to Information security describe them in detail

Solutions

Expert Solution

The fundamental principles (tenets) of information security are confidentiality, integrity, and availability.

1.Confidentiality measures are designed to protect against unauthorized disclosure of information. The objective of the confidentiality principle is to ensure that private information remains private and that it can only be viewed or accessed by individuals who need that information in order to complete their job duties.

2 Integrity involves protection from unauthorized modifications (e.g., add, delete, or change) of data. The principle of integrity is designed to ensure that data can be trusted to be accurate and that it has not been inappropriately modified.  

3.Availability is protecting the functionality of support systems and ensuring data is fully available at the point in time (or period requirements) when it is needed by its users. The objective of availability is to ensure that data is available to be used when it is needed to make decisions.

Effectively executing all three tenets of the Security Triad creates an ideal outcome from an information security perspective.


Related Solutions

Describe the major theories of motivation and relate them to organizational performance 1. What will be...
Describe the major theories of motivation and relate them to organizational performance 1. What will be some of the potential issues faced by a business looking to implement job rotation after brexit in lower skilled jobs?; such as Mcdonalds, convenience stores, hotels and so on. 2. Using the Job Characteristics model as a framework may identify changes that need to be made which will make the jobs in food retail, cleaning or farming more attractive. How might this be problematic...
Explain what an information security blueprint is, identify its major components, and explain how it supports...
Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program
Briefly describe Boyle’s, Dalton’s, and Henry’s laws as they relate to respiration. Give an example how...
Briefly describe Boyle’s, Dalton’s, and Henry’s laws as they relate to respiration. Give an example how each law can used to explain some alterations in respiratory function.
Describe the major provisions of worker's compensation laws. Based on this information, do you feel it...
Describe the major provisions of worker's compensation laws. Based on this information, do you feel it is fair that workers do not have the right to sue their employers for negligence? Why (not)? Cite your sources.
Describe the major provisions of worker's compensation laws. Based on this information, do you feel it...
Describe the major provisions of worker's compensation laws. Based on this information, do you feel it is fair that workers do not have the right to sue their employers for negligence? Why (not)? Be sure to respond in a business-like manner using proper spelling, grammar and sentence structure. Your response should be at least two paragraphs in length. thank you
Please list and describe the THREE major parts of a VHDL program. Describe each of them...
Please list and describe the THREE major parts of a VHDL program. Describe each of them and give an example.
Identify and describe the three major types of diversification growth strategies.
Identify and describe the three major types of diversification growth strategies.
In your own words describe in detail the types of cost classifications and how they relate...
In your own words describe in detail the types of cost classifications and how they relate to business as well as giving examples of those costs. Additionally discuss the overlap, i.e. how costs can be classified as more than one type of cost classification.
In your own words describe in detail the types of cost classifications and how they relate...
In your own words describe in detail the types of cost classifications and how they relate to business as well as giving examples of those costs. Additionally discuss the overlap, i.e. how costs can be classified as more than one type of cost classification.
Describe the major Information Security risks that you see associated with the move to this Microservices...
Describe the major Information Security risks that you see associated with the move to this Microservices strategy for Web Services. You should name and describe each risk that you estimate its likelihood and consequence and then describe a possible control for the risk and describe using tabular form
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT