Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Could someone correct any grammar mistakes I have made in this 27 statement assignment revolving around the CNNs security model? Here is my work: Confidentiality

Could someone correct any grammar mistakes I have made in this 27 statement assignment revolving around the CNNs security model?

Here is my work:

Confidentiality -Policy - Storage : To ensure secure storage of documents in order to maintain confidentiality , policies such as restricted entry to rooms should be used. In addition , there should be use of user IDs and passwords in order to access class information.

Confidentiality - Policy - Processing : Adopting a policy that requires user accounts and passwords ensures that only students who need to access the information and process the data have access to it.

Confidentiality - Policy - Transmission : Which deals with info security policies in place. And covers issues related to factors of transmission data.

Confidentiality - Education - Storage : While securely storing data , both students and custodians of the information should be educated on the need for the confidentiality of data.

Confidentiality - Education - Processing : Which deals the Confidentiality of data with education of users on security related issues and cover the processing and handling of data.

Confidentiality - Education - Transmission : Which deals the info security with education of users to cover the security related issues to factors that influence transmission of data.

Confidentiality - Technology - Storage : An appropriate technology that stores data in a classified manner should be put in place. Classification of info ensures confidentiality by restricting access of user to their respective class of data.

Confidentiality - Technology - Processing : it secures the data which covers the technology used to implement security for issues relating to reliable data processing.

Confidentiality - Technology - Transmission : Security of data which covers the technology used to implement security measures that influence transmission of data.

Integrity - Policy - Storage : Addresses security measures to ensure data integrity , policies such as restricted entry should be used when dealing with issues in data storage.

Integrity - Policy - Processing : This can be addressed by having a policy such as : the course would have a policy that all work submitted by the students must represent their own work , and would properly cite all sources referenced.

Integrity - Policy - Transmission : Which deals with information security and that is ensured with data integrity which covers issues related to factors that influence transmission of data.

Integrity - Education - storage : This can be addressed with education such as : Which deal with education of user security related issues dealing with data storage.

Integrity - Education - Processing : Which deals with the users on security related issues that cover the handling of data.

Integrity - Education - Transmission : which deals with users on security related issues related to factors that influence data reliability, over the education of how data is transmitted.

Integrity - Technology - Storage : In a class , a control mechanism that alerts the administration when someone with no authority tries to access or corrupt data in a computer could be installed.

For ex : use of passwords to access class material.

Integrity - Technology - processing : This can be addressed by having a technology such as : which covers data reliability and accuracy, the technology used to implement security, and the issues that cover the processing of data.

Integrity - Technology - Transmission : assurance that info is not intentionally modified in such a way creating reliability , which covers the technology used to implement security and covers issues related to factors that influence transmission of data.

Availability - Policy - Storage : This can be addressed by having a policy such as : to ensure authorized users access to information in usable format that deals with data storage.

Availability - Policy - Processing : User access the information in usable format that requires user accounts and passwords, and the process the data takes in order to access it.

Availability - Policy - Transmission : This can be addressed by having a policy such as : user access the information in usable format and covers issues that influence transmission of data.

Availability - Education - Storage : User access the information in usable format which deals with education of users on security related issues that deals with data storage.

Availability - Education - Processing : User access the information in usable format and that covers the handling of data which deals with users security issues.

Availability - Education - Transmission : In this , the user will access the information in usable format and that deals with the security issues of users and covers the issues related to factors that influence transmission of data.

Availability - Technology - Storage : Which covers the technology used to implement security measures to ensure authorized users access to information in usable format for storing data.

Availability - Technology - Processing : Ensuring that authorized individuals have both timely and reliable access to data and other resources when needed. This is used to cover the technology to implement security measures to processing of data.

Availability - Technology - Transmission : This allows the user to access the information in usable format and implement security measures with the help of technology that influence the transmission of data.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Market Research Cost Effective Searching Of The Internet And Online Databases

Authors: John F. Lescher

1st Edition

0201489295, 978-0201489293

More Books

Students also viewed these Databases questions