Question
Could someone correct any grammar mistakes I have made in this 27 statement assignment revolving around the CNNs security model? Here is my work: Confidentiality
Could someone correct any grammar mistakes I have made in this 27 statement assignment revolving around the CNNs security model?
Here is my work:
Confidentiality -Policy - Storage : To ensure secure storage of documents in order to maintain confidentiality , policies such as restricted entry to rooms should be used. In addition , there should be use of user IDs and passwords in order to access class information.
Confidentiality - Policy - Processing : Adopting a policy that requires user accounts and passwords ensures that only students who need to access the information and process the data have access to it.
Confidentiality - Policy - Transmission : Which deals with info security policies in place. And covers issues related to factors of transmission data.
Confidentiality - Education - Storage : While securely storing data , both students and custodians of the information should be educated on the need for the confidentiality of data.
Confidentiality - Education - Processing : Which deals the Confidentiality of data with education of users on security related issues and cover the processing and handling of data.
Confidentiality - Education - Transmission : Which deals the info security with education of users to cover the security related issues to factors that influence transmission of data.
Confidentiality - Technology - Storage : An appropriate technology that stores data in a classified manner should be put in place. Classification of info ensures confidentiality by restricting access of user to their respective class of data.
Confidentiality - Technology - Processing : it secures the data which covers the technology used to implement security for issues relating to reliable data processing.
Confidentiality - Technology - Transmission : Security of data which covers the technology used to implement security measures that influence transmission of data.
Integrity - Policy - Storage : Addresses security measures to ensure data integrity , policies such as restricted entry should be used when dealing with issues in data storage.
Integrity - Policy - Processing : This can be addressed by having a policy such as : the course would have a policy that all work submitted by the students must represent their own work , and would properly cite all sources referenced.
Integrity - Policy - Transmission : Which deals with information security and that is ensured with data integrity which covers issues related to factors that influence transmission of data.
Integrity - Education - storage : This can be addressed with education such as : Which deal with education of user security related issues dealing with data storage.
Integrity - Education - Processing : Which deals with the users on security related issues that cover the handling of data.
Integrity - Education - Transmission : which deals with users on security related issues related to factors that influence data reliability, over the education of how data is transmitted.
Integrity - Technology - Storage : In a class , a control mechanism that alerts the administration when someone with no authority tries to access or corrupt data in a computer could be installed.
For ex : use of passwords to access class material.
Integrity - Technology - processing : This can be addressed by having a technology such as : which covers data reliability and accuracy, the technology used to implement security, and the issues that cover the processing of data.
Integrity - Technology - Transmission : assurance that info is not intentionally modified in such a way creating reliability , which covers the technology used to implement security and covers issues related to factors that influence transmission of data.
Availability - Policy - Storage : This can be addressed by having a policy such as : to ensure authorized users access to information in usable format that deals with data storage.
Availability - Policy - Processing : User access the information in usable format that requires user accounts and passwords, and the process the data takes in order to access it.
Availability - Policy - Transmission : This can be addressed by having a policy such as : user access the information in usable format and covers issues that influence transmission of data.
Availability - Education - Storage : User access the information in usable format which deals with education of users on security related issues that deals with data storage.
Availability - Education - Processing : User access the information in usable format and that covers the handling of data which deals with users security issues.
Availability - Education - Transmission : In this , the user will access the information in usable format and that deals with the security issues of users and covers the issues related to factors that influence transmission of data.
Availability - Technology - Storage : Which covers the technology used to implement security measures to ensure authorized users access to information in usable format for storing data.
Availability - Technology - Processing : Ensuring that authorized individuals have both timely and reliable access to data and other resources when needed. This is used to cover the technology to implement security measures to processing of data.
Availability - Technology - Transmission : This allows the user to access the information in usable format and implement security measures with the help of technology that influence the transmission of data.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started