Explore BrainMass
Share

IT Security Principles

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Explain, in a paper, each of the 12 principles of information security and how each can be applied to real-life situations. Include an explanation of the four types of security policies.
 Include at least one reference.
 Follow APA formatting guidelines.
 Post your completed paper as an attachment

© BrainMass Inc. brainmass.com October 25, 2018, 1:17 am ad1c9bdddf
https://brainmass.com/physics/heinsenburgs-uncertainty-principle/it-security-principles-258550

Solution Preview

Dear student,

First of all a very warm welcome to this wonderful community of Brainmass. Hope you enjoy your stay here.

Please find the solution in the attached file.

Please do not forget to give a "5" and a positive comment once you are done. Please do not give a rating less then 5 in any case, let me know if you are unhappy with something.

Principles of Security
Your Name
Your College Name --

Principles of Security
Introduction
This paper introduces the 12 principles of information security, their relatedness to real-life situations as well as the four types of security policies. Explaining the fundamentals of information security principles, brings an understanding of good security practices and how each one is applied to different life situations.
Principles of Information Security
Principle 1: No absolute security.
This principle entails safe locks considerations (tamper resistant, but possible to be broken through), safe lock approach (an evaluation is given after testers get sufficient time and tools).
Principle 2: Security goals are confidentiality, integrity and availability.
Confidentiality only relates to authorized individual or systems (Merkow & ...

Solution Summary

The expert examines IT security principles.

$2.19
See Also This Related BrainMass Solution

Stakeholder Management - The Shareholder

I would really appreciate any help with this.

Cost Justified?

Topic: Strategic Planning, Policy and Control

Characters: Joe, District Manager of Computer Operations
Mary, Division Manager - Information Systems
John, President and CEO of a large company

Joe was recently promoted to the position of District Manager of Computer Operations for a large company. Mary, Joe's supervisor, calls him to her office. She has just been informed that the CEO has received an anonymous letter from an employee. This letter states that a recently installed (and very expensive) system does not perform as expected and has not achieved the expected results.

Joe has been aware that the system's actual performance is really as described in the anonymous letter. Joe had reported this performance problem to Mary before. Although Mary had listened to Joe, she had been the original supporter of the system and continually provides only positive feedback to the CEO on its performance.

Mary tells Joe that the CEO expects a reply to the letter. She tells Joe to draft the reply. It should say that the system is performing as projected and that all savings portrayed in the original justification documents are being achieved. She says the documentation provided with his reply should support those statements. `

Joe is upset by this directive. He feels that upper management is being misinformed in the interest of protecting a questionable decision. He approaches Mary with his concern. She says that if he does not provide the reply as requested, she will have serious doubts about his ability to perform the functions of a District Manager for the company. Joe has worked hard to achieve this position and is very worried about her statement.

Author: Originally developed by David Brickhaus, graduate student at Washington
University, as a class project in "Ethical Derision Making." Edited and submitted
by Dr. Raymond L. Hilgert, Professor of Management and Industrial Relations,
Washington University

Prepare a 3-page analysis in outline form. Your analysis should include the following:

Introduction
? Who are the stakeholders in this case?
? What are the interests of the stakeholders?

Legal Analysis
? Do any of the laws from the eGuide apply to this case?
? If they do apply, analyze the legality of the corporation's actions in this case.
? If the laws do not apply to the actions in this case, explain why they do not apply.

Ethical Analysis
? If the decision maker applied the categorical imperative theory in this case, what would the result be, and why?
? If the decision maker applied the utilitarian theory in this case, what would the result be, and why?
? If the decision maker applied the rights theory in this case, what would the result be, and why?
? If the decision maker applied the justice theory in this case, what would the result be, and why?

Conclusion and Recommendation
Based on the above, as well as what you have learned about ethical theories and foundations of moral development, what is your final recommendation to the corporation regarding this case? Your recommendation should be at least two paragraphs and include at least three reasons, with specific references to course material, stating how you arrived at that conclusion.

View Full Posting Details