1. A) Integrity - This is were authorized users can access, delete and modify
Information and they also preserve the consistency of the information.
Privacy - This is the protection of restricted information and identity of a client.
Implementing a security model by using the principles of privacy and integrity helps preserve the information assets of an organization. With integrity this helps to maintain the consistency of the information assets from being altered by unauthorized users. Privacy is where the personal information and identity of a client is handled securely. By personal information I mean by address, name, bank account number, and password and so on. Organizations are strongly required to take such precautions to safeguard the clients personal information they collect, process and store. This is to avoid fraud and identity theft. This also helps in preserving the organizations image to the public.
B) Defense in depth is whereby more than one layer of security is applied throughout a
System. This model helps the organization to prevent security breaches and gives them an amount of time to detect where and when an attack has occurred. If an organization does not have this model to protect their assets their integrity could be destroyed, their systems could get attacked by viruses and cyber terrorism.
C) Mission objective: with the use of information security it will be effective and Achieve maximum security to protect the computer systems Assets of the organization.
Vision objective: the policy standards should be raised so as enforce strong Security so as to protect the clients and make sure their Services are very efficient and that they are getting the right Services. Also make sure the staff understand the policies and Improve their skills and maximise their abilities.
D) High level security approach does increase complexity. These are the factors that
References: Algosec Inc., (2012), Examining the dangers of complexity in network security environments, Algosec Survey Insights, Rosewell GA, USA. http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&ved=0CDMQFjAC&url=http%3A%2F%2Fwww.algosec.com%2Fresources%2Ffiles%2FSpecials%2FSurvey%2520files%2F12_10_11_security_complexity.pdf&ei=MT1FUpfcDYGyrgf67oDIAw&usg=AFQjCNFJnvtM_Tkybfe2sUMTAZfPTufYzA&bvm=bv.53217764,d.bmk