Write a 10 page essay on Mid- Term Exam.Download file to see previous pages… In addition, this security model largely emphasizes the security aspects of information technology and helps people in an

Write a 10 page essay on Mid- Term Exam.

Download file to see previous pages…

In addition, this security model largely emphasizes the security aspects of information technology and helps people in analyzing all those important aspects that pertain to the comprehensive and valuable features of information technology (Whitman and Herbert 1-250). The three major components of the C.I.A triangle consist of Confidentiality, Integrity and Availability. Confidentiality: It is considered as one of the most important components of this particular model as it solely emphasizes the aspect of procurement of valuable information and it’s prevention from getting shared to unauthorized personnel. Information technology is considered to be a vital aspect as it serves multiple purposes. All kinds of major transactions that take place in today’s scenario are mostly based online mode and there are many malicious internet users who are very proficient in stealing and manipulating information that is highly restrictive (Whitman and Herbert 1-250). Integrity: It is also considered to be a vital aspect of this particular triangle as this component largely emphasizes the protection of information along with preventing it from getting modified or even manipulated from any kind of unauthorized users which may prove to disrupt the information sharing process (Whitman and Herbert 1-250). …

to be the most important aspect in the field of information technology as it widely emphasizes the broad aspect of protection of information along with ensuring unauthorized access. It also facilitates to prevent revelation or disruption of the information to unwanted individuals. The two key concepts of information security essentially include IT security and Information assurance. IT security relates to ensuring proper security to the computers and all its components. Similarly, information assurance relates to the procurement of information and prevention of the valuable data from getting lost or being manipulated. However, both of these concepts have greater significance in relation to the triangle, especially in the modern day technological context as these concepts along with the components of C.I.A aim at a basic objective i.e. to ensure all round security in matters pertaining to information technology and its proper usage (Whitman and Herbert 1-250). Best example of information technology and utilization of the concepts of information security and components of C.I.A would be that it is utilized by IT specialists, corporations, hospitals, financial institutions, government and military among broad entities. The components are utilized with the prime objective of ensuring comprehensive and steadfast security regarding various types of business information that are processed and shared for various authenticated and business purposes (Whitman and Herbert 1-250). 2. DESCRIBE AN INFORMATION SECURITY POLICY.

Leave a Reply