SRA 111 PROJECT 1
xlsx
keyboard_arrow_up
School
Pennsylvania State University *
*We aren’t endorsed by this school
Course
111
Subject
Information Systems
Date
Dec 6, 2023
Type
xlsx
Pages
6
Uploaded by DeanDog1430
S.no
Topic
Catogery
1
Confidential
2
Turn on your operating system’s firewall.
Availability
3
Install and use a reputable anti-spyware program.
Confidentialilty
4
Confidentialty
5
Change your password every 120 days
Confidentiality
Ensure all computers you use or control have an up-
to-date, supported antivirus software installed.
Run a complete scan
of your system using the anti-
virus and anti-spyware software applications
(weekly).
6
Confidentiality
7
Integrity
8
Confidentiality
9
Confidentiality
10 Ban the use of non-authorized hardware
Confidentiality
Open email attachments only if you are expecting
them from people you know
Lock your keyboard when you step away from your
computer for even a moment
Never store sensitive personal information such as
your bank account information or Social Security
Number on your computer
Do not open files sent to you in Instant Messaging
(IM) or peer-top-peer(P2P) programs.
Justification
Confidentiality is an aspect of
protecting data that is not
meant to be revealed to the
general audience. By having
up-to-date antivirus you can
save your confidential data
properly.
This falls under Availability
since the firewall acts as an
invisible wall that monitors
the flow of network traffic and
not allowing unauthorized
parties to have access to the
data.
This falls under Confidentiality
as by installing a well known
anti-spyware program u are
basically doing your best to
provide maximum security to
your confidential data
This falls under Confidentiality
because this is meant to be
done in order to make sure
that the confidential data is
kept safe and there is no one
trying to break the security
system.
This falls under Confidentiality
as you are ensuring that your
sensitive information stays
sensitive no matter what
happens, by doing this you are
making the companies
internal information even
more secure
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
This falls under Confidentiality
as you are not opening any
third-party email attachments
which can be malware in
disguise and you are opening
email attachments only from
the people who you expect to
send you. This in return saves
the company precious data
which is not meant for public
exposure
This falls under Integrity as by
locking your keyboard when
you are afk(away from
keyboard) you are basically
restricting any unauthorized
character to have access to
your system when there is no
one to monitor it.
This falls under Confidentiality
as you don’t bear the risk of
losing anything incase a
unauthorized third-party
accesses your system
This falls under Confidentiality
as the link sent to you may be
a disguise of a malicious
content which could
compromise your personal
and confidential information.
This falls under Confidentiality
as by banning the use of
unauthorized hardware u are
eliminating any way of getting
any confidential data to be
leaked. In this way, you make
sure that only authorized
users have access to
confidential information
Sources
https://www.techsoup.org/Support/articles-and-how-tos/protecting-your-organization-from-spyware
https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
https://usa.kaspersky.com/resource-center/preemptive-safety/antispyware-provides-best-computer-defens
https://antivirus.comodo.com/faq/how-antivirus-works.php#:~:text=Full%20system%20scans%20become%
https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
https://www.cisa.gov/uscert/ncas/tips/ST04-010
https://www.nsslaptopservicecenter.com/why-it-is-needed-to-lock-the-keyboard
https://www.ftc.gov/business-guidance/resources/protecting-personal-information-guide-business
https://itsecurity.uiowa.edu/resources/everyone/best-practices-instant-messaging
https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help