Question

In: Computer Science

DQ1: List any of the three common core security principles and discuss how it applies to...

DQ1: List any of the three common core security principles and discuss how it applies to your organization.

DQ2: List and discuss three security policies that support the business continuity planning in your organization. How does Business Impact Analysis BIA help in realigning organizational security policies in your organization?

Solutions

Expert Solution

Answer)

1) The core security principle will always be the CIA Triad that is the confidentiality, integrity, and availability which would ensure the kind of security systems.

This principle is popularly being used as an information security model which can help in guiding the efforts of an organization as well as help with the policy for aiming to secure the data. Integrity is mostly used for data management in the correct manner and prevent users from modifying anything improperly or accidentally or maliciously. Availability on the other hand is to keeping the systems up and running for the user's accessibility, confidentiality is mostly with respect to the information which is crucial and important and should not be circulated beyond the authorized individual.

This is implemented in an organization as a security concept meant for controlling the security, to safeguarding, and managing the systems. All of the risks or threats or the vulnerability are being measured via the CIA Triad.

2) CIA is mostly used for providing important security features that can prevent the issues related to compliance and ensure the business continuity and also help to protect the reputation of a specific organization.

The BIA would be used as a process for finding the critical business functions and also look for any disruptions to any functions and also allow one to fetch the information for developing the recovery strategy and in turn limiting the potential loss.

Please comment in case you need any other inputs.
Please share a like if you find the answer helpful.
Thank you.


Related Solutions

discuss any three psychological approaches to launch an information security attack.
discuss any three psychological approaches to launch an information security attack.
Discuss the importance of principles and core values to ethical decision making. Discuss the influence of...
Discuss the importance of principles and core values to ethical decision making. Discuss the influence of corporate culture on business ethics.
Explain any two of Davis and Moore’s core principles in their analysis of the education system.
Explain any two of Davis and Moore’s core principles in their analysis of the education system.
- List three differences between the Sun’s core and the photosphere. - Describe how sunspots are...
- List three differences between the Sun’s core and the photosphere. - Describe how sunspots are produced. - Summarize in words the three steps in the proton-proton chain. Explain why energy is produced when hydrogen fuses into helium using Einstein’s E = mc2 equation.
Discuss the three elements of ( AirPods) ? The three elements are ( core product -...
Discuss the three elements of ( AirPods) ? The three elements are ( core product - supplemental features - symbolic and experiential benefits )
compare and contrast two fundamental security design principles. Analyze how these principles and how they impact...
compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.
List seven of the principles/features of qualitative research espoused by Patton and discuss how one of...
List seven of the principles/features of qualitative research espoused by Patton and discuss how one of them can affect any qualitative research you may undertake in future.
Discuss any security situations that you have personally encountered and how they were handled by the...
Discuss any security situations that you have personally encountered and how they were handled by the business organization. Do you feel comfortable with how businesses are safekeeping your data and transaction activities?
A brief description of three core business services provided by bank and security and privacy needs...
A brief description of three core business services provided by bank and security and privacy needs in relation to the bank’s core business services.
The Belmont Report summarizes the ethical principles and guidelines for research involving human subjects. Three core...
The Belmont Report summarizes the ethical principles and guidelines for research involving human subjects. Three core principles are identified: respect for persons, beneficence, and justice. Even though these principles are considered equal, prioritize them in order of importance. Explain decisions.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT