OCU C)ISSO A Discussion Lesson 02
- This topic has 10 replies, 8 voices, and was last updated 3 weeks, 4 days ago by
Trae Johnson.
-
AuthorPosts
-
-
November 1, 2024 at 1:25 pm #99328
Manny Varela
KeymasterExplain how information security management plays a key role in the success of a company. Be sure to discuss at least 3 of the following: challenges, key factors, goals, expectations, components, controls, the ownership chain, policy, maintenance, human resources, and the Triad. Use at least 3 terms from this chapter making sure to present the definition as well. Use the text and video in this discussion response.
-
November 12, 2025 at 3:59 pm #111157
Carlos Martes
ParticipantInformation security management is essential to the success of any company because it protects the valuable data, ensures business continuity, and builds customer trust. One key factor is policy, which sets clear rules and expectations for how information and technology resources are used and protected. Strong policies help employees understand their responsibility. Another important element is human resources, since trained and aware employees Confidentiality ensures that only authorized people can access data, integrity keeps are the first line of defense against threats like phishing or social engineering. Lastly, the CIA Triad in which stands for Confidentiality, Integrity and Availability is the foundation of information security. Confidentiality ensures that only authorized people can access data; integrity and keeps information accurate and unaltered, and availability makes sure systems are up and running when needed. Together, these principles and practices allow a company to operate safely, meet it’s goals and respond effectively to security challenges.
-
November 14, 2025 at 8:20 am #111195
Mjulius513
ParticipantInformation security management is important for a company because it protects valuable things like data, computers, and accounts. It also helps the company work without problems. A key idea in security is the Triad: Confidentiality, Integrity, and Availability.
Confidentiality means only the right people can see the information. Integrity means the information stays correct and is not changed by mistake or on purpose. Availability means the information and systems are ready to use whenever they are needed.
Another important part of security is controls, which are steps taken to lower risks. Administrative controls include rules, policies, and training. Technical controls include tools like firewalls, passwords, and encryption. Physical controls include locks, badges, and security cameras. These controls help protect the company from different threats.
Policies are also necessary because they explain what employees should do and how they should act. When the Triad, controls, and policies work together, they help keep the company safe and successful.
-
November 16, 2025 at 6:46 pm #111242
Carlos Martes
ParticipantAnother good input Mjulius,
I will say that information security management protect important data and systems. It focuses on the CIA Triad, which is confidentiality, integrity, and availability. Controls like policies, training, firewalls and physical security help reduce risks. Policies guide employees on what to do. When everything works together the company stays safe and runs smoothly.
-
November 17, 2025 at 10:14 pm #111300
Isabelle Tubbs
ParticipantHi, Mjulius. I like your description of each part of the CIA triad. Providing confidentiality, integrity, and availability are vital for any company’s information security, which naturally leads to the different types of controls and policies you mentioned. To do this, a company will need a combination of security measures to make sure the information is correct and secure.
-
November 20, 2025 at 10:56 am #111358
Trae Johnson
ParticipantYou gave a strong overview of confidentiality, integrity, and availability, and how controls help maintain them. Your focus on how policies direct employee actions shows good understanding of how security works across the whole company.
-
-
November 15, 2025 at 11:30 am #111227
Isabelle Tubbs
ParticipantInformation security management is essential for protecting a company’s assets and creating controls to do so. When creating this type of management, certain factors will need to be considered. It matters how much a company is willing to spend on security, and what controls are implemented will depend on whether it aligns with company policy and overall regulations. Also, information security management plans will be expected to reduce risk (providing confidentiality, integrity, and availability) while also staying within budget. These plans must also not get in the way of users’ productivity and efficiency.
The controls that should be created can be administrative, technical, and physical. Administrative controls are management responsibilities that are necessary to protect assets, which can include employee management, testing, and awareness training. Technical controls can be defined as logical protection mechanisms that can be built into the software and hardware. These can be firewalls, encryption, etc. Finally, physical controls can protect the facility’s perimeter and internal resources by putting protection like fences or sensors.-
November 16, 2025 at 10:47 am #111238
Mjulius513
ParticipantYour explanation is clear, and I agree with it. Information security management helps a company protect its data by using the right controls while staying within budget. Using administrative, technical, and physical controls together is important. Administrative controls guide people, technical controls protect systems with tools like firewalls, and physical controls secure the building. When all three work together, the company stays safer without slowing down employees.
-
November 20, 2025 at 10:56 am #111357
Trae Johnson
ParticipantYou explained the Triad very well and showed how controls support each part of it. I appreciated that you pointed out the role policies play; they guide employee behavior and help keep the company in line with good security practices.
-
-
November 18, 2025 at 4:30 pm #111318
Kanthony
ParticipantWhen responding, make sure you cover each of the items: Explain how information security management plays a key role in the success of a company. Be sure to discuss at least 3 of the following: challenges, key factors, goals, expectations, components, controls, the ownership chain, policy, maintenance, human resources, and the Triad. Use at least 3 terms from this chapter making sure to present the definition as well. Use the text and video in this discussion response.
-
November 20, 2025 at 10:44 am #111356
Trae Johnson
ParticipantInformation security management is about a company’s success through identification, maintenance of critical information, and systems that are assured to be protected, reliable, and usable. Some of the basic concepts include confidentiality, integrity, and availability, also known as the CIA Triad. Confidentiality refers to ensuring that only authorized people have access to information. Integrity pertains to protecting information from unauthorized modification and thus maintaining its accuracy and trustworthiness. Availability refers to assuring that information and systems are accessible when required to support business operations. Each security decision is based on these three principles to help the company maintain smooth, secure operations.
Another important ingredient in security management is strong policy, effective controls, and continuous maintenance. A security policy is a formal set of rules that defines the expectations for employee information handling. It builds uniformity within the organization and lays the groundwork for accountability. Controls are countermeasures used to mitigate risk. Examples include administrative controls such as training and procedures, technical controls like firewalls and encryption, and physical controls such as secure access points. Maintenance is also equally important because security is never a one-time deal. Systems must be monitored, updated, and reviewed to ensure that controls continue being effective against new threats. When these elements all interact, the organization will be able to protect its assets, minimize the occurrence of incidents, and ensure long-term success.
-
-
AuthorPosts
- You must be logged in to reply to this topic.