Business Finance Homework Help

Application of The CNSS Security Model in Milimani Sacco Essay

 

I’m working on a management question and need guidance to help me learn.

The Committee on National Security Systems (CNSS) Model identifies the nine interacting factors that influence the security of any resource. The nine key factors are:

  1. Policy:  which deals with info security policies in place
  2. Education: which deals with education of users on security related issues
  3. Technology: which covers the technology used to implement security measures
  4. Confidentiality: confidentiality of info/data
  5. Integrity: addresses measures in place to ensure data integrity
  6. Availability: to ensure authorized users access to information in usable format
  7. Storage: issues dealing with data storage
  8. Processing: issues that cover the processing and handling of data
  9. Transmission: covers issues related to factors that influence transmission of data

Assume you are responsible for implementing a security program within your own organization or another organization of your choice. Apply the CNSS model by identifying the interacting factors you will need to address within this organization. You will need to think about the employees, customers, and all other stakeholders. Address each of the nine key factors and which ones you would need focus on, providing a brief description for each of these factors. The deliverable for this activity should be a brief paragraph for each factor to be included in the model.

Below is a resource to help with this activity:

DBE-IS M01 C02 V02 CNSS Security Model (YouTube, 03:25)

As businesses increase the implementation of enterprise information systems and their capabilities, InfoSec has become an essential element of everyday operations. Chapter 1 introduces the broad concept of InfoSec and the roles of managers both from a business perspective as well as from an IT perspective. This chapter also explains major concepts needed to create InfoSec models and identify common InfoSec threats and prevention methods.

Read the following from your textbook, Management of Information Security (6th edition) by Michael E. Whitman & Herbert J. Mattord:

Chapter 1 – Introduction to the Management of Information Security

SUPPLEMENTAL RESOURCES

The following supplemental resources will provide you with additional descriptions of the CIA Triad, the top security predictions for 2019, and the role of information security managers. These supplements will help you in completing the activities for Module 1.

Confidentiality, Integrity, and Availability (CIA triad) (Tech Target Network) (Links to an external site.)

The Top 19 Security Predictions for 2019 (Government Technology) (Links to an external site.)

Guiding Principles in Information Security (InfoSec) (Links to an external site.)

Information Security Manager Roles and Responsibilities (InfoSec)