Describe how you apply the security triad (confidentiality, integrity, and accessibility) components in some area of your work life or personal life.
Describe how you apply the security triad (confidentiality, integrity, and accessibility) components in some area of your work life or personal life.
June 18, 2020 Comments Off on Describe how you apply the security triad (confidentiality, integrity, and accessibility) components in some area of your work life or personal life. Uncategorized Assignment-helpAs mentioned in the course introduction, much of MIS is now centered on technology. Accordingly, MIS capabilities are mostly limited to the hardware and software capabilities of a given system. Computer systems have six major components: a central processing unit (CPU), primary storage, input devices, output devices, secondary storage, and communication devices. Computers store and process information in the form of binary digits call bits. A string of eight bits is called a byte. There are several coding systems for arranging binary digits into characters. The most common are EBCIDIC and ASCII. The major systems’ software are operating systems (OS) and application software. The system software or OS mediates between application software and hardware. On the other hand, application software is supplied by the vendor or developed by programmers to address specific business applications. This Module will first discuss the hardware component of technology, followed by software. Module 2 finishes with a discussion of information security as a component of technology.Case AssignmentBased on the course materials presented, write a paper answering the following questions.Part I – Go online and find a case study about the implementation of an ERP or SCM system, or cloud migration project. Was it successful? How long did it take? What were the issues? Does the case study tell you how much money the organization spent?Part II – Describe how you apply the security triad (confidentiality, integrity, and accessibility) components in some area of your work life or personal life. For example, if you work at a bank, you might consider how you maintain confidentiality, integrity, and accessibility for one kind of data.Assignment ExpectationsYour paper should be short (3-5 pages, not including cover sheet and references) and to the point. It is to be structured as a point/counterpoint argument, in the following manner: Take a definite stand on the issues and develop your supporting argument carefully. Using material from the Background information and any other sources you can find to support specific points in your argument is highly recommended; try to avoid making assertions for which you can find no support other than your own opinion.You will be particularly assessed on:Precision: You see what the module is all about and structure your paper accordingly. You draw on a range of sources and establish your understanding of the historical context of the question. You carry out the exercise as assigned or carefully explain the limitations that prevented your completing some parts. (Running out of time isn’t generally considered an adequate limitation).Support for assertions: You use examples, citations (especially from the required readings), and elaboration to support assertions. You provide evidence that you have read the required background materials.