Information Security Policies
135 words for each question

1. Why is it necessary to define policy elements?

2. Assignment help – Discuss the terms confidentiality, integrity, and availability as they relate to information systems. Why are they important?
1. Why is it necessary to define policy elements?
Defining policy elements is necessary for the policy users to have a clear and concise understanding of what is required (Mathias, 2009). Proper definitions ensure that there is no room left guesswork where the users do not know the policy’s true intentions. In this way, the reader gets an accurate picture of these policy elements and their significance in achieving the policy’s primary objectives. Furthermore, the researchers get to know how these policy elements will interact with overall organizational procedures and techniques, thus avoiding any unnecessary collisions or even violations (Mathias, 2009). Considering the development of policy included the policy audience, the final production and especially the elements need to be defined to ensure everything has been included in the audience. Policies need to be tailored to meet particular needs, and proper definitions provide an understanding of how the needs will be met.
2. Assignment help – Discuss the terms of confidentiality, integrity, and availability as they relate to information systems. Why are they important?
Confidentiality encompasses particular rules to be followed to limit access to information. Integrity entails the assurance that the information in a system is accurate and can be trusted. Availability entails guaranteeing that the authorized parties will have reliable access to the right information (Smart Eye Technology, 2019). These elements form the CIA triad model that has been designed for the maintenance of privacy policies in information security within an organization. The three form fundamental objectives to information security. Therefore, for information systems to ensure that their systems are secured enough, their security measures need to be provided confidentiality, availability and integrity (Smart Eye Technology, 2019). The three attributes are important as they address a distinct aspect of protecting information within an information system. The model aids in bringing together the attributes of an information security program that ensure achievement of higher security levels.

References
Mathias, C. (2009). Elements of an effective security policy. Retrieved from https://www.networkworld.com/article/2234556/elements-of-an-effective-security-policy.html
Smart Eye Technology. (2019, December 9). Confidentiality, integrity, & availability: Basics of information security. Retrieved from https://smarteyetechnology.com/confidentiality-integrity-availability-basics-of-information-security/#:~:text

Published by
Essays
View all posts