Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
The nine interacting aspects that determine the security of any resource are identified by the Committee on National Security Systems (CNSS) Model. The following are the nine most important factors:
Policy: this refers to the existing information security policies.
Education: this refers to the process of educating users about security risks.
Technology: this refers to the tools that are used to put security measures in place.
Confidentiality refers to the privacy of information and data.
Measures in place to ensure data integrity are discussed.
Availability: to ensure that authorized users have access to information in a format that they can use.
Data storage: there are a variety of challenges that arise when it comes to data storage.
Issues relating to data processing and handling are referred to as processing.
The term “transmission” refers to the factors that influence data transfer.
Assume you’re in charge of creating a security program at your own company or another company of your choosing. Apply the CNSS model to this organization by identifying the interacting elements that need to be addressed. You’ll have to consider your employees, customers, and other stakeholders. Address each of the nine important aspects and which ones you’ll need to concentrate on, giving a brief summary of each. A brief paragraph for each factor to be included in the model should be the deliverable for this task.
Here’s a link to a site that can help you with this activity:
CNSS Security Model DBE-IS M01 C02 V02 (YouTube, 03:25)
As companies expand their use of enterprise information systems and their capabilities, InfoSec has become a necessary part of day-to-day operations. The first chapter presents the general notion of information security and the roles of managers from both a business and an IT standpoint. This chapter also covers key principles for developing InfoSec models and identifying prevalent InfoSec threats and mitigation techniques.
Read the following passages from Michael E. Whitman and Herbert J. Mattord’s textbook, Management of Information Security (6th edition):
Introduction to Information Security Management (Chapter 1)
ADDITIONAL RESOURCES
Additional definitions of the CIA Triad, top security predictions for 2019, and the responsibilities of information security managers can be found in the auxiliary resources below. These supplements will assist you in completing the Module 1 activities.
(Tech Target Network) Confidentiality, Integrity, and Availability (CIA trinity) (Links to an external site.)
Security Predictions for 2019: The Top 19 (Government Technology) (This is a link to another website.)
Information Security (InfoSec) Guiding Principles (Links to an external site.)
Roles and Responsibilities of an Information Security Manager (InfoSec)
In Milimani Sacco’s essay, the CNSS Security Model is used
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow
In Milimani Sacco’s essay, the CNSS Security Model is used |
In Milimani Sacco’s essay, the CNSS Security Model is used