Question

Assume that a security model is needed to protect the information used in the class you...

Assume that a security model is needed to protect the information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief
a statement that explains how you would address the components represented in each of the 27 cells.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution

27 cells

  1. Confidentiality-Policy-Storage.
  2. Confidentiality-Policy-Processing.
  3. Confidentiality-Policy-Transmission.
  4. Confidentiality-Education-Storage.
  5. Confidentiality- Education -Processing.
  6. Confidentiality- Education -Transmission.
  7. Confidentiality-Technology-Storage.
  8. Confidentiality- Technology -Processing.
  9. Confidentiality- Technology -Transmission.
  10. Integrity-Policy-Storage.
  11. Integrity-Policy-Processing.
  12. Integrity-Policy-Transmission.
  13. Integrity-Education-Storage.
  14. Integrity-Education-Processing.
  15. Integrity-Education-Transmission.
  16. Integrity-Technology-Storage.
  17. Integrity- Technology -Processing.
  18. Integrity- Technology -Transmission.
  19. Availability-Policy-Storage.
  20. Availability -Policy-Processing.
  21. Availability -Policy-Transmission.
  22. Availability -Education-Storage.
  23. Availability - Education -Processing.
  24. Availability - Education -Transmission.
  25. Availability -Technology-Storage.
  26. Availability - Technology -Processing.
  27. Availability - Technology -Transmission.

3 dimensions used in the security models

  1. Confidentiality, Integrity and Availability
  2. Policy, Education and Technology
  3. Storage, Processing and Transmission

---

Confidentiality - Policy - Storage   An example of protecting the confidentiality of class information in storage by means of policy could be simply issuing rules to keep unauthorized viewers access restricted, such as a rule to lock file cabinets that contain the information.

Confidentiality - Policy - Processing   An example of protecting the confidentiality of class information in processing by means of policy could be simply issuing rules to keep unauthorized viewers access restricted while information is being processed, such as only allowing registered students in the class to attend and listen to lecture.

Confidentiality - Policy - Transmission   An example of protecting the confidentiality of class information in transmission by means of policy could be simply issuing rules to keep unauthorized viewers access restricted while information is being processed, such as only allowing registered students in the class to attend and listen to lecture.

Confidentiality - Education - Storage   An example of protecting the confidentiality of class information in storage by means of education could be accomplished by training students and faculty, such as teaching them what people are authorized access to the information in storage.

Confidentiality - Education - Processing   An example of protecting the confidentiality of class information that is being processed by means of education could be accomplished by training students and faculty, such as training how to verify if the people are authorized to get the information before class starts by something such as a student ID or schedule.

Confidentiality - Education - Transmission   An example of protecting the confidentiality of class information that is being transmitted by means of education could be accomplished by training students and faculty, such as training the students and faculty to close doors to the classroom while in lecture so that others outside would not hear the lecture.

Confidentiality - Technology - Storage An example of protecting the confidentiality of class information that is being stored by means of technology could be accomplished by something as simple as locks on file cabinets that contain the information while not in use.

Confidentiality - Technology - Processing   An example of protecting the confidentiality of class information that is being processed by means of technology could be accomplished by forcing the use of electronic IDs during classes.

Confidentiality - Technology - Transmission   An example of protecting the confidentiality of class information that is being transmitted by means of technology could be accomplished by having a password on a class website.

Integrity - Policy - Storage   An example of protecting the integrity of class information that is being stored by means of policy could be accomplished by simply making rules that state that only certified people may alter the information

Integrity - Policy - Processing   An example of protecting the integrity of class information that is being processed by means of policy could be accomplished by making a rule that forces students to study in only quiet areas without the help of other people not in the class.

Integrity - Policy - Transmission   An example of protecting the integrity of class information that is being processed by means of policy could be accomplished by making a rule that the teacher is not allowed to drink alcohol before class.

Integrity - Education - Storage   An example of protecting the integrity of class information that is being stored by means of education could be accomplished by teaching those who store the information who is authorized to change it.

Integrity - Education - Processing   An example of protecting the integrity of class information that is being processed by means of education could be accomplished by informing the students that studying with other non students will give incorrect information.

Integrity - Education - Transmission   An example of protecting the integrity of class information that is being transmitted by means of education could be accomplished by teaching the teachers effective ways to teach.

Integrity - Technology - Storage   An example of protecting the integrity of class information that is being stored by means of technology could be accomplished by electronically storing all the data on a device that forces authorization to modify it.

Integrity - Technology - Processing   An example of protecting the integrity of class information that is being processed by means of technology could be accomplished by making PowerPoint presentations to verify what the teacher says.

Integrity - Technology - Transmission   An example of protecting the integrity of class information that is being transmitted by means of technology could be accomplished by printing the PowerPoint presentations and giving a copy to each student.

Availability - Policy - Storage   An example of protecting the availability of class information that is being stored by means of policy could be accomplished by making policy stating that authorized students are allowed access to certain stored information.

Availability - Policy - Processing   An example of protecting the availability of class information that is being processed by means of policy could be accomplished by making a rule that only those authorized are allowed to enter the classroom.

Availability - Policy - Transmission   An example of protecting the availability of class information that is being transmitted by means of policy could be accomplished by making a rule that allows only students into the classroom and none other.

Availability - Education - Storage   An example of protecting the availability of class information that is being stored by means of education could be accomplished by teaching those who store the information the correct process of storage so that things don’t get lost.

Availability - Education - Processing   An example of protecting the availability of class information that is being processed by means of education could be accomplished by teaching those who teach the information to speak up so that everyone in the classroom can hear what is being taught.

Availability - Education - Transmission   An example of protecting the availability of class information that is being transmitted by means of education could be accomplished by teaching the students to remain quiet in the classroom so that all can hear the information.

Availability - Technology - Storage   An example of protecting the availability of class information that is being stored by means of technology could be accomplished by making the information available on the Internet via a password protected website.

Availability - Technology - Processing   An example of protecting the availability of class information that is being processed by means of technology could be accomplished by the teacher providing the PowerPoint files available to the student on the Internet to study.

Availability - Technology - Transmission   An example of protecting the availability of class information that is being transmitted by means of technology could be accomplished by the teacher using a microphone so the lecture is loud enough for all students to hear

---

all the best

Add a comment
Know the answer?
Add Answer to:
Assume that a security model is needed to protect the information used in the class you...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Assume you have a Car class that declares two private instance variables, make and model....

    1. Assume you have a Car class that declares two private instance variables, make and model. Write Java code that implements a two-parameter constructor that instantiates a Car object and initializes both of its instance variables. 2. Logically, the make and model attributes of each Car object should not change in the life of that object. a. Write Java code that declares constant make and model attributes that cannot be changed after they are initialized by a constructor. Configure your...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 2. 15 pts. We have discussed in length the COSO model for an effective system of...

    2. 15 pts. We have discussed in length the COSO model for an effective system of Internal Control including its 5 components: (CE) Control Environment; (RA) Risk Assessment; (CA) Control Activities; (I&C) Information & Communication; & (M) Monitoring. To test your understanding of these, in the block immediately preceding each individual statement below, identify the COSO component each statement best applies to. Hint: There are 5-CE's; 4-RA's; 3-CA's; 3-IC's; & 2-M's. The organization specifies objectives with sufficient clarity to enable...

  • Instruction: Create a UML essential use case model for a new library management system. Use a...

    Instruction: Create a UML essential use case model for a new library management system. Use a UML s/w tool to do the work (i.e. MS Visio or LucidChart). A narrative description of the use cases in your model (select one or two for practice) is also required. A narrative template is supplied in this document. To complete the use case narrative, you may make assumptions or create data points as needed. A use case is a depiction of a to...

  • First Drawing Assignment: Draw as complete a Class diagram as you can for the following possible...

    First Drawing Assignment: Draw as complete a Class diagram as you can for the following possible application. We wish to BUILD A SOCIAL NETWORKarrow-10x10.png for COMPUTERarrow-10x10.png Science graduate students. This network will allow any graduate student to login and logout. Once logged in, the student may do any of the following: 1. Join a group of fellow students 2. Leave a group of fellow students 3. Create a group which fellow students may join if they wish. Creating a group...

  • the OOP project is needed to be coded in netbeans and store a information in file...

    the OOP project is needed to be coded in netbeans and store a information in file on local machine it could be stored with xml tags since its easier. OOP Project Description Requirements: You are to design and build software media rental system. The software will track each user’s account with its rentals. A user can rent multiple media of different type/genre and all that user’s rentals are managed under their account (single account per user). A user will be...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • You will develop an E-Commerce database used to maintain customers, products and sales information. You are...

    You will develop an E-Commerce database used to maintain customers, products and sales information. You are required to 1) gather and analyze requirements 2) design logical structure of the database 3) create stored procedures to develop the tables and insert the data 4) write SQL statements for data extraction and reporting. Throughout the course of this semester you have analyzed the requirements for an eCommerce database, designed and developed your database. As a class we have gone through the process...

  • Study Skills Activity 5: Taking Tests – Page 323 This activity is designed to help you discover the most effective way for you to deepen your learning, in college and beyond, and improve your grades....

    Study Skills Activity 5: Taking Tests – Page 323 This activity is designed to help you discover the most effective way for you to deepen your learning, in college and beyond, and improve your grades. To complete each activity, choose one new strategy from the reading for your experiment, track your choices for a week, and then report and reflect on your results through the questions provided. Fifth up: Taking Tests. There are 28 strategies for test taking. Identify the...

  • Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortc...

    Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortcoming (IR, BP or CP) and recommend possible solutions. Course Learning Outcomes: CL05, CL01: Student will be able to understand, implement and bring recommendations to contingency plan Tools or Equipment Needed: PC Internet explorer or chrome Internet Theoretical Background: A contingency plan is a course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen. A contingency...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT