Assignment
There are a myriad of different information security management systems available on the market for business. Research and select three different systems and create a comparison table of what they offer and why a business would select one over another. Submit your table for grading.
Note: 300 words. It should be a comparison Table and References needed.
Discussion Response
Q. Read the below paragraph and write your opinion of 150 words with intext citation and references must.
Confidentiality:
– Sticky notes with passwords on them that are left on computer monitors where unauthorized people can readily access them.
– Workers sending or receiving private information through unencrypted email or instant messaging, where it could be read by hackers.
Integrity:
– A hacker accessing a company’s database and altering the contents of specific fields, such as staff salaries or product prices.
– A system being infected by malware that changes data, such as the values of financial transactions.
Availability:
– A distributed denial-of-service (DDoS) assault that overwhelms a company’s servers and prevents authorized customers from using its services.
– A natural calamity or a power outage that prevents a company’s IT systems from operating normally and makes it difficult or impossible for employees to access vital information and systems.