Information Systems for Business and Beyond (2019)

security threats. The chapter begins with an overview focusing on how organizations can stay secure. Several different measures that a company can take to improve security will be discussed. Finally, you will review a list of security precautions that individuals can take in order to secure their personal computing environment. The Information Security Triad: Confidentiality, Integrity, Availability (CIA) Confidentiality Protecting information means you want to want to be able to restrict access to those who are allowed to see it. This is sometimes referred to as NTK, Need to Know. Everyone else should be disallowed from learning anything about its contents. This is the essence of confidentiality. For example, federal law requires that universities restrict access to private student information. Access to grade records should be limited to those who have authorized access.

The security triad

Availab ility


Information Systems for Business and Beyond (2019) pg. 115

Made with FlippingBook flipbook maker