Essays.club - Get Free Essays and Term Papers
Search

Implementation Solution to Cia

Autor:   •  March 21, 2018  •  1,519 Words (7 Pages)  •  455 Views

Page 1 of 7

...

Top Five Methods of Abiding by CIA Principles

[pic 8]

[pic 9]

[pic 10]

[pic 11]

[pic 12][pic 13]

Systems Development Life Cycle

System Development Life Cycle(SDLC) is all about the methods used for creating, testing setting up and making a diagram of the information technology systems. The SDLC has several stages that can be utilize by system engineers for delivering information technology systems (Dhillon, 1997).

Initiation: A proposal is fashioned upon the identifying the organization’s needs.

System Concept Development: This should do with concepts boundaries.

Planning: The first stage in the acquisition of resources necessary for attaining a solution.

Design: Focused on techniques required for the deliverance of a particular functionality.

Development: This helps in changing the design into a complete information system.

Integration and Test: This helps in demonstrating that the system meets the essential requirements.

Implementation: Implementation of the system into a prolific setting.

Operation and Maintenance: Helps in the maintenance and operation of the information technology systems.

Disposition: Helps in giving comprehensive information about goings-on of the end-of-system (Ferrari & Thuraisingham, 2006).

SDLC Tasks

- To come up with systems of high quality that meet customers’ expectations.

- To harmonize and even out multifaceted computer systems.

- To help system engineers in designing and delivering of information technology systems.

- Includes all activities of the cycle.

- To define diverse phases during the development of an IT project.

SDL CYCLE[pic 14][pic 15][pic 16]

[pic 17][pic 18][pic 19][pic 20]

[pic 21]

[pic 22][pic 23][pic 24]

[pic 25]

[pic 26]

[pic 27][pic 28]

---------------------------------------------------------------

[pic 29][pic 30][pic 31][pic 32][pic 33]

Project Assumptions

- Data should be view only by authorize users.

- Awareness training should be conducted about security risks and on how to avert the risk.

- Users should be careful when managing information.

- Backups services should be made available to restore data.

- Data integrity should be provided with the use of checksum.

- Version control software should be used to avert invalid alterations of data.

- Firewalls with extra security could safeguard against interruption and remote data resulting from unwanted activities (The United States, 2000).

Projects Constraints

- The volume of data required brings about extra challenges to the paradigm of the CIA. The multiple sources of data may lead to lack data error of accountability.

- There is a risk of exposing personal identifiable information. Internet Privacy: gatherings of fragmented data from several endpoints can be sampled to yield information which is sensitive; this causes lack of protection of individual information from being exposed to the environment.

- It is difficult to decide which element of the triad is more important than the others.

Critical Project Barriers

- Internal company politics and culture may affect the plan’s adoption.

- The company may not be willing financial, to support the implementation of the project.

- The company’s management team may not be able to understand the purpose of the project.

- Efforts to standardize the process may be block by alternative projects.

- Pets projects from management may hinder new projects.

Conclusion

Complying with information technology security is an objective that is permanent. The methods and processes used for doing this however, are ever changing with the advent of new threads. The uses of information technology systems in our homes and companies in the country, make our homes and companies vulnerable to attacks related to technology. It is therefore necessary to lay down long lasting solutions to guarantee confidentiality, integrity, and availability of data. In this case, the discussion highlighted challenges related to information security; possible solutions, their constraints and suitable measures that should be put in place.

References

Association for Computing Machinery. (1998). ACM transactions on information and system

security. New York, NY: Author.

Chew, E., Stine, K., Swanson, M., & National Institute of Standards and Technology (U.S.).

(2007). Information System Security Reference Data Model. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards, and Technology.

Dhillon, G. (1997). Managing information system security. Basingstoke: Macmillan.

Ferrari, E., & Thuraisingham, B. M. (2006). Web and information security. Hershey PA: IRM

Press.

...

Download:   txt (10.9 Kb)   pdf (57.1 Kb)   docx (18.4 Kb)  
Continue for 6 more pages »
Only available on Essays.club