Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Hello, I am looking for someone to write an essay on System Identification and Security Categorization. It needs to be at least 1500 words.Download file to see previous pages... The principles of the

Hello, I am looking for someone to write an essay on System Identification and Security Categorization. It needs to be at least 1500 words.

Download file to see previous pages...

The principles of the CIA triad. integrity, availability and confidentiality are highly prioritized in the information system. Necessary control mechanism has been incorporated into the information security system in order to provide protection.

These controls have been categorized to technical, management and operational controls. VA’s contain critical information and therefore effective organization, an accomplishment and supervision controls should be conducted with care. The main obligation of the e VAs is to accomplish the highest level of security while meeting the critical needs of an organization.

The VA has been typically viewed by the majority as a mechanism for protecting information and information systems. This is not the case since its major concern is to protect the availability, confidentiality and integrity of the information and the information system. The control principles form the pillars of the CIA triad.

Actions regarding risk management can be executed when planning, assessment of the significance of the risk and identification are carried out in a proper way. Though risk management will not absolutely eliminate risk, it possibly reduces the risk actualization, provides significant remedy and penitential risks in the future. The main goal of the VA is to protect information and information system through risk management program to achieve strategic and operational goals.

The strategy adopted by the Information Security Management Act is based on risk approach. This is sated in the VA (2007), “the operating unit is responsible for conducting an accurate and thorough risk assessment to identify potential risk, vulnerabilities and threats to the confidentiality, integrity and availability of sensitive information held by VA.” The possibility of incurring a threat is potentially construed by the management&nbsp.controls.&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question