Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please type a breif statement for each line describing the addressment . Each li

ID: 3875972 • Letter: P

Question

Please type a breif statement for each line describing the addressment. Each line represents a cube address in the CNSS model.

Confidentiality – Policy – Storage

Confidentiality – Policy – Processing

Confidentiality-Policy-Transmission

Confidentiality-Education –Storage

Confidentiality-Education-Processing

Confidentiality-Education-Transmission

Confidentiality-Technology-Storage

Confidentiality-Technology-Processing

Confidentiality-Technology-Transmission

Integrity-Policy-Storage

Integrity-Policy-Processing

Integrity-Policy-Transmission

Integrity-Education-Storage

Integrity-Education-Processing

Integrity-Education- Transmission

Integrity-Technology-Storage

Integrity-Technology-Processing

Integrity-Technology-Transmission

Availability-Policy-Storage

Availability-Policy-Processing

Availability-Policy-Transmission

Availability-Education-Storage

Availability-Education-Processing

Availability-Education-Transmission

Availability-Technology-Storage

Availability-Technology-Processing

Availability-Technology-Transmission

Explanation / Answer

Confidentiality – Policy – Storage

The statement deals with data confidentiality, security policies and data storage. That means we can say that confidential data that has pass the security policies will be stored in final data storage. As an example we can say trainee who had pass the exam with 90% will join the company, others will be just going for an internship.

Confidentiality – Policy – Processing

The statement deals with data confidentiality, security policies and processing of data. That means we can say that confidential data that has pass the security policies will be processed and data to be handled. Let us say joining the company will have some policies that will be all the reference of the work must be properly indicated.

Confidentiality-Policy-Transmission

The statement deals with data confidentiality, security policies and transmission of data. That means we can say that confidential data that has pass the security policies will cover issue related to transmission of data. That means joining if any issue occurs that will bound to transmit the data must be issued.

Confidentiality-Education –Storage

The statement deals with data confidentiality, education on security related issue and data storage. That means we can say that confidential data that deals with education of users on security related issue and dealing with data storage.

Confidentiality-Technology-Processing

The statement deals with data confidentiality, technology used for security measure and processing of data. That means we can say that confidential data that is used for security measured must be processed.

Confidentiality-Technology-Transmission

The statement deals with data confidentiality, technology used for security measure and transmission of data. That means we can say that confidential data that is used for security measured must be processed and transmitted.

Integrity- Policy- Processing

The statement formed by the intersection of the Integrity, Policy   and Processing cells. This can be addressed by having a policy such , The course would have a policy that would all work submitted by the students must represent their own work, and would properly cite all sources referenced.