An Investigation of the use of Security Principles in a Selected Organization


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

An Investigation of the use of Security Principles in a Selected Organization


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Section 1: Introduction. Section 2: Overview of the chosen company. Section 3: The Information Systems’ Characteristics (Using the Expanded CIA triad). Section 4: Classification of the company’s Assets. Section 5: Naming the threats the company is currently facing. Section 6: Recognizing the Vulnerabilities in the company’s assets. Section 7: Calculate the risk values related to 2 vulnerabilities Section 8: Listing and classifying the countermeasures used or recommended. This includes the following subsections: a. The Security-Related Technology implemented/needed. (3 marks) b. The SETA program implemented/needed (4 marks) c. The Information Security policies implemented/needed (18 marks – 6 marks for each policy) Section 9: Conclusion Section 10: References see the attachments.