Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
6th Edition
ISBN: 9781337750738
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 5RQ
Program Plan Intro
C.I.A Triad:
Triad means group or set of three related ones. The combination of confidentiality, integrity and availability is referred as C.I.A triad.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How do these three(CIA Triad) principles work together? Can you think of any situations where one of these could be considered more important than the other two?
What is the main distinction between the top-down and bottom-up approaches to the
protection of confidential information?
Why is the strategy that works from the top down more effective than the one that works
from the bottom up?
Let's imagine the CIA's "holy trinity" of secret, trust, and alertness in operation.
Chapter 1 Solutions
Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Prob. 1ECh. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 5ECh. 1 - Prob. 6ECh. 1 - Prob. 1CEDQCh. 1 - Prob. 2CEDQCh. 1 - Prob. 3CEDQCh. 1 - Prob. 1EDMCh. 1 - Prob. 2EDM
Knowledge Booster
Similar questions
- Imagine the CIA's sacred trinity of secrecy, trust, and attention working together.arrow_forwardWhere does an organization's information security begin and finish, in your opinion? To put it another way, when does a company's security policy and measures go into action, and when do they stop? Do you think any of these restrictions will be lifted in the future? Explain how and why if this is the case. What would be the cause if not?arrow_forwardWhat is the Cybercrime Conceptual Framework? Do you have any sources to support your assertions?arrow_forward
- Imagine a situation in which the CIA's three pillars of secrecy, trust, and vigilance can all operate in concert.arrow_forwardThe CIA's sacred trinity of secrecy, trust, and vigilance doesn't seem to be working together very often, so how about we make up a case where it does?arrow_forwardLet's imagine a world where the CIA's three pillars of secrecy, trust, and alertness are not only present but thrive.arrow_forward
- What are the key differences between the top-down and bottom-up approaches to the protection of confidential information? Why is it better to work from the top down rather than working from the bottom up?arrow_forwardExactly where do you think the responsibility for a company's information security ends and where does it begin, according to you? When does a company have complete say over the activation and deactivation of its various layers of security protection? Let me know if you think any of these outlines need to be adjusted upwards.arrow_forwardLet's think about how the CIA's "holy trinity" of secrecy, trust, and being on the lookout would work.arrow_forward
- Why is the CIA Triad in the shape of a triangle?arrow_forwardWhere in a business do you think the responsibility for information security starts and ends? The organization's control decides when security policies and measures go into effect and when they go out of effect, respectively. Do you believe any of these limits should be further widened or widened? If that's the case, how did you go about it? If that's not the case, what's going on?arrow_forwardImagine a situation when the CIA's three pillars of secrecy, trust, and alertness can all work together effectively.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you