Saturday, December 21, 2019

Information Security The John McCumber Model Essay

1) McCumber model: There are number of different models proposed as framework for information security but one of the best model is McCumber model which was designed by John McCumber. In this model the elements to be studied are organized in a cube structure, in which each axis indicates a dissimilar viewpoint of some information security issue and there are three major modules in each axis. This model with 27 little cubes all organized together looks similar like a Rubiks cube. There are three axes in the cube they are: goals desired, Information states, and measures to be taken. At the intersection of three axes you can research on all angles of an information security problem. Goals desired the three goals expected when you are†¦show more content†¦2) Confidentiality- Policy practice- Transmission: The university should have a policy for students and faculty, such as they are not permitted to share the lecture notes or subject information with anyone else who is not registered for the class or not authorized. 3) Confidentiality-Technology- Transmission: The university should allocate separate username and password for only the students who are registered into the subject to check the lecture material and updates. 4) Confidentiality - Education Training-Storage: The university should educate the students and faculty to access authorized data without exposing the data to outsiders. 5) Confidentiality- Policy Practice- Storage: The university should have a policy, such as the access to lecture notes posted or info of the subject can be accessed by registered students only 6) Confidentiality-Technology- Storage: The university should have the latest technology and antivirus to maintain the database servers from threats. 7) Confidentiality - Education Training- Processing: The confidentiality can be protected in the state of processing through education is by educating and training the students and lecturers to exchange information among the authorized persons only through allocated secured student email. 8) Confidentiality - Policy and Practice-Processing: The university should have a policy that the students and lecturers are authorizedShow MoreRelatedThe Threats Of Business Information Resources And Corrective Actions On The Modern Age Of Technology2249 Words   |  9 PagesThis paper will address some of the threats to business’ information resources and corrective actions on how these businesses can protect themselves in the modern age of technology. While technology has rapidly expanded a corporation’s abilities to deploy digital communication and data sharing, it has also ushered in a wave of cyber criminals and illegal data mining of proprietary information. This paper contains information on the tools that can be used to protect businesses and private users fromRead MorePrinciples of Information Security, 4th Ed. - Michael E. Whitman Chap 0118683 Words   |  75 PagesLicensed to: CengageBrain User Licensed to: CengageBrain User Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord Vice President Editorial, Career Education Training Solutions: Dave Garza Director of Learning Solutions: Matthew Kane Executive Editor: Steve Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Development Editor: Lynne Raughley Editorial Assistant: Jennifer Wheaton Vice President Marketing, Career Education TrainingRead MoreModern History.Hsc.2012 Essay25799 Words   |  104 PagesThe British and French wanted U.S. * Units used to reinforce their troops already on the battle lines and not waste scarce shipping on bringing over supplies. * The U.S. rejected the first proposition and accepted the second. General John J. Pershing, American Expeditionary Forces (AEF) commander, refused to break up U.S. units to be used as reinforcements for British Empire and French units. * As an exception, he did allow African-American combat regiments to be used in French

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.