CSS150-1302B-01: Introduction to Computer Security Week 1 Individual Project Brian Frank Colorado Technical University Online 5/27/2013 Name and describe the seven different categories of the Expanded CIA triangle. The seven expanded categories to the Expanded CIA Triad include Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility, and Possession (Northeastern University, n.d.). * Confidentiality is only allowing access of data to authorized personnel (Kim and
Words: 1086 - Pages: 5
approach to embrace ecommerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an e-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based secure Keywords: Trusted Third Party (TTP)
Words: 2757 - Pages: 12
party to inform on the situation. The protection of the customer’s information should be the highest priority next to the company’s files. GDI Roles and Responsibilities The CSM will be responsible for the network and all its components in GDI. The staff will consist of 11 personnel who will assist in this endeavor. Policy Directives Information Security Policy Policy Information security is the protection of information from threats in order to ensure business continuity, minimize business
Words: 1859 - Pages: 8
OUTSOURCING RISKS As Information Technology professionals, we have accepted the fact that there is some sort of risk involved with data. This is why we deal with risk assessments and analysis, implementing risk plans, and maintaining them to reduce, avoid, mitigate and accept the risks as we deal with the data. Now, the company can address these issues to the best of their ability by checking network configurations routinely and upgrading their security as soon as an upgrade is available. They
Words: 1102 - Pages: 5
Introduction: Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance. Security control effectiveness is measured by correctness of implementation and by how adequately the
Words: 4395 - Pages: 18
In the field of information security, there are many types of law. As senior managers, it is important to be knowledgeable of the legal environment. Once this information is learned and retained, then it will increase access and understanding of information security. Laws and practices that are related to information security will be discussed and how these laws impact organizations today and ensures confidentiality, integrity, and availability, of information and information systems. Governance
Words: 824 - Pages: 4
DOCUMENTED DATA SECURITY POLICY.................................4 1. POLICY STATEMENT It shall be the responsibility of the I.T. Department to provide adequate protection and confidentiality of all corporate data and software systems, whether held centrally, on local storage media, or remotely, to ensure the continued availability of data and programs to all authorized members of staff, and to ensure the integrity of all data and configuration controls. Summary of Main Security Policies 1.1
Words: 1364 - Pages: 6
The TJX Corporation is a large retailor with stores throughout the United States,, Puerto Rico and United Kingdom. In 2005, a security breach of credit card information occurred through a seventeen-month period. The intrusion of customer personal information has grossed the concern of the security among their IT infrastructure. The following criteria based upon their security concerns and customer relationships recovery. Their growth as a discount retailer is dependent on the course of action they
Words: 3688 - Pages: 15
Mrs. Chasity Eldridge 6880 Blue Creek Rd. Brookwood, AL 35444 Mobile: 205-862-1519 Home: 205-477-1890 chasityeldridge@gmail.com Career Objective As of this year, I have fifteen years of experience working in team environments where I have been the team leader as well as a teammate; I have also been fortunate enough to work at least part time for over ten years on my own. I have enjoyed being a project manager for the majority of time over the past ten years; mainly because they were all
Words: 1184 - Pages: 5
All federal agencies are required to comply with FISMA guidelines for IT systems security. Failure to pass an inspection can result in unfavorable publicity, increased oversight of your agency, computer breaches, and even a reduction in your IT budget. In this white paper, we’ll look at: • What FISMA is and why it was created • Key steps in achieving FISMA compliance • Tools that can help you meet FISMA requirements FISMA provides a set of specific guidelines for federal agencies on how
Words: 894 - Pages: 4