When looking at the CIA triad in a networked setting, what are some of the first things we should be setting up to ensure it’s appropriate process?

When looking at the CIA triad in a networked setting, what are some of the first things we should be setting up to ensure it’s appropriate process?.

I’m trying to study for my Computer Science course and I need some help to understand this question.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

(recommended minimum 75 words)

Respond:

When looking at the CIA triad in a networked setting, what are some of the first things we should be setting up to ensure it’s appropriate process? You say that they need to educate staff. I agree. What things should be done to educate them? Should it be computer based training? Should it be seminars? What’s the best method for delivery?

Respond:

There are 10 top threats to information security that all businesses need to be aware of when designing their own security: rapid development of technology, social media attacks, mobile malware, third-party entry, neglecting proper configuration, outdated security software, lack of encryption, corporate data on personal devices, and inadequate security technology (“Top 10 Threats to Information Security”, n.d.). When you look at these threats it is very easy to see how they can all apply to a University campus where you will have not just students and teachers but also contractors doing work or maintenance, visitors touring the campus, etc. which can become a security nightmare. As you can see from those examples there can be a problem from both outside and inside the network and it can be intentional or non-intentional such as a direct attack on the network itself or an employee or student opening up a phishing email but there are some best practice policies that businesses use to reduce the threat.

Policies and procedures are the first layer of all security designs and having effective policies can reduce the risk of attacks. Access control policies are one of the most important policies and is based on the “least privilege” concept, only allowing the least amount of access to the network that is needed for the user such as having a separate limited guest internet access versus access to the main corporate network access. In a university setting you also have libraries with computers as well as satellite workstations that anyone can use so two-factor authentication policies would be a good idea to establish who is using the computers and if they have authorization to do so. A third policy that can be beneficial is running security audits on all the systems and reporting any possible weaknesses that were found which when done regularly can prevent possible intrusions and attacks. These were just a few useful policies but there are many more that can be established depending the expanding needs of the university.

References:

“Top 10 Threats to Information Technology”. (n.d.). Georgetown University. Retrieved from https://scsonline.georgetown.edu/programs/masters-technology-management/resources/top-threats-to-information-technology

Respond:

When looking at the CIA triad in a networked setting, what are some of the first things we should be setting up to ensure it’s appropriate process? You say that they need to educate staff. I agree. What things should be done to educate them? Should it be computer based training? Should it be seminars? What’s the best method for delivery?

When looking at the CIA triad in a networked setting, what are some of the first things we should be setting up to ensure it’s appropriate process?

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply