logo

IT Security and Risk Management | CNSS Security Model

6 Pages1362 Words197 Views
   

Added on  2020-02-24

About This Document

  • IT security and data protection are major concerns for businesses due to cyber threats such as hacking, phishing, and spoofing.
  • The CNSS security model involves data confidentiality, integrity, and availability to ensure information security.
  • IT landscapes have changed with newer technologies such as cloud computing, resulting in the need for newer security infrastructures.
  • Security models outline security measures and access controls to protect data integrity and availability.
  • Access control limits data access to authorized personnel only through methods such as user authentication, data monitoring, and physical and logical access control.
  • Threats such as hacking, phishing, and data loss can cause serious harm to organizations and require effective risk management.
  • Risk assessment involves identifying and analyzing threats and categorizing them according to priority to manage risks effectively.

IT Security and Risk Management | CNSS Security Model

   Added on 2020-02-24

ShareRelated Documents
Running head: FORUM POST
Forum Post
Name of the Student
Name of the University
Author Note
IT Security and Risk Management | CNSS Security Model_1
1FORUM POST
Table of Contents
1. Topic 1- IT Security and Technology Landscape............................................................2
2. Topic 2- IT Security Models and access controls............................................................3
3. Topic 3- IT security Threat and Risk Assessment...........................................................3
4. References........................................................................................................................5
IT Security and Risk Management | CNSS Security Model_2
2FORUM POST
1. Topic 1- IT Security and Technology Landscape
It security and data protection is a major issue in today’s business world. This is
particularly because the data resource of an organization is exposed to a number of security
threats from the cyber attacks, which include hacking, phishing, spoofing and so on. The CNSS
security model involves various factors of data security and integrity. This includes data
confidentiality, integrity and availability. Data confidentiality means that the authorized users
can only access the data stored in the information security system or to the members it is
intended to and cannot be accessed by unauthorized members. This is an essential phenomenon
of data security (Von Solms & Van Niekerk, 2013). Data integrity refers to the fact that data is
not changed while storage or its transformation that is the data remains consistent and accurate.
Alteration of data is not allowed and is against the security policy and hence this is an essential
consideration for IT data security. Data availability ensures that the data continues to be
available at a required level of performance and in every situation. The threats may harm or
hamper any of the security conditions as a result of severe security attack which may include the
involvement of viruses and other malicious software. Ensuring information security is utmost
essential and therefore it should be the top most priority for any organization. Therefore, proper
security measures are to be undertaken to prevent or lessen the effects of the security threats
(Peltier, 2013).
IT landscapes have considerably changed with the involvement of newer technologies
such as cloud computing. This has considerably resulted in the change of strategies in business
concepts and adoption of newer technologies in business environments. The newer landscapes or
technologies have given rise to newer difficulties and challenges, which in turn resulted in the
need of newer security infrastructure for data protection (CeArley & Claunch, 2012).
IT Security and Risk Management | CNSS Security Model_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management : Assignment
|7
|1669
|112

Report- IT Security & Risk Assessment - ITC596
|10
|1547
|47

Report on Security and Risk Management of Data
|9
|1317
|106

IT Security & Technology Landscape
|7
|1766
|78

BUSI 414 - UT Security and Risk Assessment
|9
|1437
|83

Importance of Database Security in Maintaining Confidentiality, Integrity and Availability of Information
|9
|1906
|181