SRA 111 PROJECT 1

xlsx

School

Pennsylvania State University *

*We aren’t endorsed by this school

Course

111

Subject

Information Systems

Date

Dec 6, 2023

Type

xlsx

Pages

6

Uploaded by DeanDog1430

Report
S.no Topic Catogery 1 Confidential 2 Turn on your operating system’s firewall. Availability 3 Install and use a reputable anti-spyware program. Confidentialilty 4 Confidentialty 5 Change your password every 120 days Confidentiality Ensure all computers you use or control have an up- to-date, supported antivirus software installed. Run a complete scan of your system using the anti- virus and anti-spyware software applications (weekly).
6 Confidentiality 7 Integrity 8 Confidentiality 9 Confidentiality 10 Ban the use of non-authorized hardware Confidentiality Open email attachments only if you are expecting them from people you know Lock your keyboard when you step away from your computer for even a moment Never store sensitive personal information such as your bank account information or Social Security Number on your computer Do not open files sent to you in Instant Messaging (IM) or peer-top-peer(P2P) programs.
Justification Confidentiality is an aspect of protecting data that is not meant to be revealed to the general audience. By having up-to-date antivirus you can save your confidential data properly. This falls under Availability since the firewall acts as an invisible wall that monitors the flow of network traffic and not allowing unauthorized parties to have access to the data. This falls under Confidentiality as by installing a well known anti-spyware program u are basically doing your best to provide maximum security to your confidential data This falls under Confidentiality because this is meant to be done in order to make sure that the confidential data is kept safe and there is no one trying to break the security system. This falls under Confidentiality as you are ensuring that your sensitive information stays sensitive no matter what happens, by doing this you are making the companies internal information even more secure
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
This falls under Confidentiality as you are not opening any third-party email attachments which can be malware in disguise and you are opening email attachments only from the people who you expect to send you. This in return saves the company precious data which is not meant for public exposure This falls under Integrity as by locking your keyboard when you are afk(away from keyboard) you are basically restricting any unauthorized character to have access to your system when there is no one to monitor it. This falls under Confidentiality as you don’t bear the risk of losing anything incase a unauthorized third-party accesses your system This falls under Confidentiality as the link sent to you may be a disguise of a malicious content which could compromise your personal and confidential information. This falls under Confidentiality as by banning the use of unauthorized hardware u are eliminating any way of getting any confidential data to be leaked. In this way, you make sure that only authorized users have access to confidential information
Sources https://www.techsoup.org/Support/articles-and-how-tos/protecting-your-organization-from-spyware https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html https://usa.kaspersky.com/resource-center/preemptive-safety/antispyware-provides-best-computer-defens https://antivirus.comodo.com/faq/how-antivirus-works.php#:~:text=Full%20system%20scans%20become% https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
https://www.cisa.gov/uscert/ncas/tips/ST04-010 https://www.nsslaptopservicecenter.com/why-it-is-needed-to-lock-the-keyboard https://www.ftc.gov/business-guidance/resources/protecting-personal-information-guide-business https://itsecurity.uiowa.edu/resources/everyone/best-practices-instant-messaging https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help