How can the cia triad of security be applied to an


Q2. How can the CIA triad of security be applied to an organization and not just a single system ? Give examples to support your position.

Q3. What are some of the legal issues involved with privacy data ? List at least three of these issues and the type of system that would need to consider legal use of the data associated with the issue.

Q5. What privacy issues should be considered with employee access to software systems even when the software is house within the organization ?

Q8. What are the key factors involved in assessing the importance of a risk ? Give examples to justify your rankings.

Please provide 1-2 paragraphs of dialogue for each question. Must be orginal in content.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: How can the cia triad of security be applied to an
Reference No:- TGS02519964

Now Priced at $10 (50% Discount)

Recommended (92%)

Rated (4.4/5)