Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What principles should the information security analyst apply in order to develo

ID: 3868248 • Letter: W

Question

What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions:

1-What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?

2-What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition?

3-When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?

Explanation / Answer

Information security analyst should keep in mind some of facts while developing policies and guidelines and three basic principles to keep availability, integrity and confidentiality and these collectively are referred as CIA and considered to be main objective of security.When we talk about confidentiality we need to ensure that required level of secrecy is enforced at each place where data processing is taking place and make sure there is no unauthorized access.Also need to make sure this doesn't just happen while data is in system but also while data is transmitted over network.Proper network monitoring should be in place to avoid hacking, stealing password files.There should be plans for people awareness towards how to maintain confidentiality.Next is Integrity which should focus on integrity of data stored such that it gives assurance of accuracy and reliability of information and again unauthorized modification is not allowed.There should be plan in place to detect intrusions, strict access control, virus detection. Then comes availability which ensures timely access to information and only to authorized personnel.There should be plan in place for maintaining backups to replace failed systems, and system in place to tackle with environmental issues like temperature, electricity, contaminants which could harm the system and hence availability of information.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote