windows Security Profiling and Auditing

User Generated

fzneg_pbqr

Writing

Description

Assignment Details:

In an essay, answer the following questions based on this week’s module:

  • How do you know if your system is meeting your security goals?
  • You can verify that controls are working, but how do you know if they are getting the job done?
  • What auditing practices or procedures would you implement for your organization? Why?

Deliverables:

Provide information from your readings to support your statements. Your well-written essay should be 4-5 pages in length, incorporating at least two academic resources from the Library in addition to the case study. Cite all sources academic writing standards and APA style

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: INFORMATION SYSTEMS

1

Information Systems
Name
Institution

INFORMATION SYSTEMS

2

Information Systems
Knowing Whether the Information System Meets Security Goals
The security of an information system is a critical element for an organization. There are
certain goals that an information security is expected to meet in order to be certified as a secure
system free form ant threat an vulnerability. These goals reflect the expectation of the
organization based on the nature of the system in place and the transactions or process taking
place in the system (White, Fisch & Pooch, 2017). The goal of an information system is to secure
the data and information of an organization by ensuring that it meets three information security
tiered namely; confidentiality, integrity, and availability.
The goal of confidentiality of an information security is to ensure that the privacy of
information is protected and only made accessible to the authorized personnel. Thus, an
information security can be evaluated to ascertain its ability to meet this goal by testing its ability
to restrict the use and accessibility to the information to the authorized users, process, and
entities within the organization (Farooq, Waseem, Khairi, & Mazhar, 2015). Information should
be able to move from source to recipient without any risk of interference by unauthorized
persons. One way to confirm that the information meets confidentiality requirements is to check
for its compartmentalization. Even more important is to check if the system provides for data
encryption.
Integrity refers to the acc...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags