Access over 20 million homework & study documents

Cynthia Castellon Week 2 Assignment

Content type
User Generated
Rating
Showing Page:
1/4
1
Running head: CMIT 425 WEEK 2 ASSIGNMENT
CMIT 425 Week 2 Essay Questions
Cynthia Castellon
University of Maryland Global Campus

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
CMIT 425 WEEK 1 ASSIGNMENT
Essay Question 1
Information in a company differ in its importance and hence they are classified
according to their importance and sensitivity. The classification is usually to determine the kind
of security that would be put in place for a particular data. Classification of data is determined
by looking into the value of the data, its age, the regulations pertaining its disclosure, laws and
replacement costs. Data of high value would pass all the requirements aforementioned and
hence need higher security compared to the others. Military data could be classified into five
levels namely; unclassified, sensitive, confidential, secretive and top secret. Commercial data
classification is built on four levels of classification namely; public, sensitive, private and
confidential (Ca & Mc, 2015). Each level represents the level of sensitivity of data to the
organization. For example, an individual holding a confidential clearance would access
sensitive, unclassified and confidential information that they are bound to know. Access is only
granted on a need to know priority.
Essay Question 2
Just like the classification of data, levels of responsibility are also classified depending
on the data protection and asset security. The layers of responsibility are classified into four
categories namely; data owner, data custodian, user and security auditor. Data owner is part of
the senior management and they are in charge of all the assets in a company. All responsibility
including assigning day to day activities is granted to the data owner except the delegation of
total responsibility (Mohanty, Thotakura & Ramkumar, 2014). Data custodian on the other
hand is responsible for discharging controls duties for the data owner. They usually do not
decide on the controls required for data security. The user layer has the responsibility to adhere
into all the data security policies and procedures set aside (Shaikh & Sasikumar, 2015). Lastly
is the security auditor whose major responsibility is to examine the organization’s security

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
1 Running head: CMIT 425 WEEK 2 ASSIGNMENT CMIT 425 Week 2 Essay Questions Cynthia Castellon University of Maryland Global Campus 2 CMIT 425 WEEK 1 ASSIGNMENT Essay Question 1 Information in a company differ in its importance and hence they are classified according to their importance and sensitivity. The classification is usually to determine the kind of security that would be put in place for a particular data. Classification of data is determined by looking into the value of the data, its age, the regulations pertaining its disclosure, laws and replacement costs. Data of high value would pass all the requirements aforementioned and hence need higher security compared to the others. Military data could be classified into five levels namely; unclassified, sensitive, confidential, secretive and top secret. Commercial data classification is built on four levels of classification namely; public, sensitive, private and confidential (Ca & Mc, 2015). Each level represents the level of sensitivity of data to the organization. For example, an individual holding a confidential clearance would access sensitive, unclassified and confidential information that they are bound to know. Access ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4