How can the cia triad of security be applied to an


Question:

1. How can the CIA triad of security be applied to an organization and not just a single system? Give examples to support your position.

2. What are some of the legal issues involved with privacy data? List at least three of these issues and the type of system that would need to consider legal use of data associated with the issue.

3. What privacy issues should be considered with employee access to software systems even when the software is housed within the organization?

4. What are the key factors involved in assessing the importance of a risk? Give examples to justify your ranking.

Solution Preview :

Prepared by a verified Expert
Software Engineering: How can the cia triad of security be applied to an
Reference No:- TGS01115294

Now Priced at $35 (50% Discount)

Recommended (92%)

Rated (4.4/5)