Question

What key elements are found in a good information security system?

What key elements are found in a good information security system?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The key elements are found in a good information security system;

Confidentiality as only people authorized to access the data and information assets to should be given the permission of accessing and the information should not be disclosed to others;

Integrity; keeping the IT systems operational, data intact, complete and accurate is a must.

Add a comment
Know the answer?
Add Answer to:
What key elements are found in a good information security system?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Education is a key component of good network security. Many companies invest good money on training...

    Education is a key component of good network security. Many companies invest good money on training their employees. Why do these companies still have security issues caused by their own employees?

  • Describe the elements of a good MBO program, including 5 key elements and Explain the potential...

    Describe the elements of a good MBO program, including 5 key elements and Explain the potential problems of the MBO approach How can Managers Plan Effectively in Dynamic Environments?

  • What is the key factor that differentiates a Management Information System from a Decision Support System?...

    What is the key factor that differentiates a Management Information System from a Decision Support System? Select one: a. A Decision Support System contains models that use information to make decisions. b. A Decision Support Systems is only a software app, whereas a Management Information Systems consists of hardware and software c. A Decision Support System is often Web-based, whereas a Management Information System is restricted to company computers for security reasons. d. A Decision Support System consists of software...

  • A key tenet of the NIST SP 800-53r5 (Security and Privacy Controls for Information Systems and...

    A key tenet of the NIST SP 800-53r5 (Security and Privacy Controls for Information Systems and Organizations) specification is that security and privacy requirements are a subset of all requirements that can be imposed on an information system and/or an organization. In other words, when we develop systems/applications for example, we must consider security and privacy requirements as part of overall system requirements A. True B. False

  • Management Information System

    1- What are the technology Involved in apple company "How it set up in terms of its IT infrastructure, the hardware, software, telecommunication, information security, networks, and other elements. 2- Analysis the existing System of apple Analyze the key problems of the existing system used by the company including:• Transaction processing systems (TPS)• Enterprise Resource Planning (ERP) Systems• Functional Area Information Systems• Business intelligence• DSS 3- discuss the Possible Solutions and Suggestions to help the organization in solving the key problems? 

  • Management Information System

    1- What are the technology Involved in Amazon.com"How it set up in terms of its IT infrastructure, the hardware, software, telecommunication, information security, networks, and other elements. 2- Analysis the existing System of AmazonAnalyze the key problems of the existing system used by the company including:• Transaction processing systems (TPS)• Enterprise Resource Planning (ERP) Systems• Functional Area Information Systems• Business intelligence• DSS 3- discuss the Possible Solutions and Suggestions to help the organization in solving the key problems? 

  • Describe the key elements of an effective stock control system. List at least 10 elements.

    Describe the key elements of an effective stock control system. List at least 10 elements.

  • Pick 2 of the 6 key elements of information science outlined on page 58 (Debons, week...

    Pick 2 of the 6 key elements of information science outlined on page 58 (Debons, week 2), try to think of an example of an information system (or branch of the information science discipline) that addresses that feature.

  • 8. What are the key elements of protected health information? 10. you are a medical records...

    8. What are the key elements of protected health information? 10. you are a medical records supervisor in a clinic. a pharmaceutical firm asks for data on patients with a certain diagnosis for a study of the numbers of people with the disease. can you give it the information it asks for? if so, how will you provide the information?

  • Which of the following is a good way to help ensure that your company’s information security...

    Which of the following is a good way to help ensure that your company’s information security policies represent best practices? A - Base them on current industry standards for practices and technology. B - Provide little or no opportunity for policy exceptions to be granted. C - Copy key parts of similar policies you find on the Internet. D - Keep the suggested guidelines to a minimum, and focus on mandatory standards.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT