More Subjects
Risk Management Framework, CIA and security policy
[Name of the Writer]
[Name of the Institution]
Risk Management Framework, CIA and security policy
Introduction
In this new world of technology, every organization is adopting technology for their business operations. Every operation relies on the technology in this new world. There are many benefits provided by the technology as well as there are a lot of problems created by the technology for organizations. The companies are having a concern regarding the privacy of their confidential data and the privacy of their customers. They need to find out the way by which they can protect access to their sensitive data and increase their data security.
Discussion
Data security is the major concern for all the organization these days. It is commonly referred to as confidentially and integrity of data. Data security needs to make sure that the data is only accessible to the authorized individual or groups. The methods to increase data security should make sure that the information which is not required should be destroyed. They should only focus on collecting the data which is necessary and keep it safe. The company needs to make sure that there IT staff are aware of how they can secure the confidential data of the company. The IT staff needs to find out any vulnerabilities in the current IT's infrastructure to make sure that hackers can't access any private data of the company and their clients.
The company needs to monitor the activities of their employees to make sure they are not violating any privacy statement of the company. The servers and operating systems of the organization needs to be properly configured, and the rules for the management of accounts and passwords are clearly defined so that only authorized people can have access. Confidentially, integrity and availability is a model which is also known as CIA is being used by organizations to guide their policies. Confidentially is referred to prevent data from the access of the wrong people, Integrity includes maintaining the consistency & accuracy of data and Availability includes maintenance of hardware problems (Von solms & Van Niekerk, 2013).
Conclusion
Cybersecurity is the solution to all these problems as it provides the protection of systems including software and hardware to protect them from cyber attacks. It is being used by many enterprise organizations to protect their data from unauthorized individuals and parties (Klimburg, 2012). CIA is a model which is very helpful in guiding the policies for information security in an organization, and it must be used by every organization to protect their data from hackers.
References
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Klimburg, A. (Ed.). (2012). National cyber security framework manual. NATO Cooperative Cyber Defense Center of Excellence.
More Subjects
Join our mailing list
© All Rights Reserved 2024