OCU C)ISSO A Discussion Lesson 02
- This topic has 3 replies, 6 voices, and was last updated 23 hours, 8 minutes ago by
Isabelle Tubbs.
-
AuthorPosts
-
-
November 1, 2024 at 1:25 pm #99328
Manny Varela
KeymasterExplain how information security management plays a key role in the success of a company. Be sure to discuss at least 3 of the following: challenges, key factors, goals, expectations, components, controls, the ownership chain, policy, maintenance, human resources, and the Triad. Use at least 3 terms from this chapter making sure to present the definition as well. Use the text and video in this discussion response.
-
November 12, 2025 at 3:59 pm #111157
Carlos Martes
ParticipantInformation security management is essential to the success of any company because it protects the valuable data, ensures business continuity, and builds customer trust. One key factor is policy, which sets clear rules and expectations for how information and technology resources are used and protected. Strong policies help employees understand their responsibility. Another important element is human resources, since trained and aware employees Confidentiality ensures that only authorized people can access data, integrity keeps are the first line of defense against threats like phishing or social engineering. Lastly, the CIA Triad in which stands for Confidentiality, Integrity and Availability is the foundation of information security. Confidentiality ensures that only authorized people can access data; integrity and keeps information accurate and unaltered, and availability makes sure systems are up and running when needed. Together, these principles and practices allow a company to operate safely, meet it’s goals and respond effectively to security challenges.
-
November 14, 2025 at 8:20 am #111195
Mjulius513
ParticipantInformation security management is important for a company because it protects valuable things like data, computers, and accounts. It also helps the company work without problems. A key idea in security is the Triad: Confidentiality, Integrity, and Availability.
Confidentiality means only the right people can see the information. Integrity means the information stays correct and is not changed by mistake or on purpose. Availability means the information and systems are ready to use whenever they are needed.
Another important part of security is controls, which are steps taken to lower risks. Administrative controls include rules, policies, and training. Technical controls include tools like firewalls, passwords, and encryption. Physical controls include locks, badges, and security cameras. These controls help protect the company from different threats.
Policies are also necessary because they explain what employees should do and how they should act. When the Triad, controls, and policies work together, they help keep the company safe and successful.
-
November 15, 2025 at 11:30 am #111227
Isabelle Tubbs
ParticipantInformation security management is essential for protecting a company’s assets and creating controls to do so. When creating this type of management, certain factors will need to be considered. It matters how much a company is willing to spend on security, and what controls are implemented will depend on whether it aligns with company policy and overall regulations. Also, information security management plans will be expected to reduce risk (providing confidentiality, integrity, and availability) while also staying within budget. These plans must also not get in the way of users’ productivity and efficiency.
The controls that should be created can be administrative, technical, and physical. Administrative controls are management responsibilities that are necessary to protect assets, which can include employee management, testing, and awareness training. Technical controls can be defined as logical protection mechanisms that can be built into the software and hardware. These can be firewalls, encryption, etc. Finally, physical controls can protect the facility’s perimeter and internal resources by putting protection like fences or sensors.
-
-
AuthorPosts
- You must be logged in to reply to this topic.