Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please type a breif(short )statement for each line describing the addressment .

ID: 3876075 • Letter: P

Question

Please type a breif(short)statement for each line describing the addressment. Each line represents a cube address in the CNSS model. Their should be 27 statements.

Confidentiality – Policy – Storage

Confidentiality – Policy – Processing

Confidentiality-Policy-Transmission

Confidentiality-Education –Storage

Confidentiality-Education-Processing

Confidentiality-Education-Transmission

Confidentiality-Technology-Storage

Confidentiality-Technology-Processing

Confidentiality-Technology-Transmission

Integrity-Policy-Storage

Integrity-Policy-Processing

Integrity-Policy-Transmission

Integrity-Education-Storage

Integrity-Education-Processing

Integrity-Education- Transmission

Integrity-Technology-Storage

Integrity-Technology-Processing

Integrity-Technology-Transmission

Availability-Policy-Storage

Availability-Policy-Processing

Availability-Policy-Transmission

Availability-Education-Storage

Availability-Education-Processing

Availability-Education-Transmission

Availability-Technology-Storage

Availability-Technology-Processing

Availability-Technology-Transmission

Explanation / Answer

The CNSS Model is a 3*3*3 cube with 27 cells where each cell represents an area of intersection the three dimensions that should be addressed to secure information system. Each of these cells should be properly addressed in reviewing any information security program. This model can be used to ensure protection of class information. Below , the 27 cells are addressed:

Confidentiality -Policy - Storage : To ensure secure storage of documents in order to maintain confidentiality , policies such as restricted entry to rooms should be used. In addition , there should be use of user IDs and passwords in order to access class information.

Confidentiality - Policy - Processing : Adopting a policy that requires user accounts and passwords ensures the only students that need to access the information and process the data have access to do.

Confidentiality - Policy - Transmission : Which deals with info security policies in place.and covers issues related to factors of transmission data.

Confidentiality - Education - Storage : While securely storing data , both students and custodians of the information should be educated on the need for the confidentiality of data.

Confidentiality - Education - Processing : Which deals the Confidentiality of data with education of users on security related issues and cover the processing and handling of data.

Confidentiality - Education - Transmission : Which deals the info security with edu of users to cover the security related isuues to factors that influence transmission of data.

Confidentiality - Technology - Storage : An appropriate technology that stores data in a classifies manner should be put in place. Classification of info ensures confidentiality by restricting access of user to their respective class of data.

Confidentiality - Technology - Processing : it secures the data which covers the technology used to implement security for issues and process the data access to do.

Confidentiality - Technology - Transmission : Security of data which covers the technology used to implement security measures that influence tranmission of data.

Integrity - Policy - Storage : Which addresses measures in place to ensure data integrity , policies such as restricted entry should be used and issues dealing with data storage.
Integrity - Policy - Processing : This can be addressed by having a policy such as : the course would have a policy that all work submitted by the students must represent their own work , and would properly cite all sources referenced.

Integrity - Policy - Transmission : Which deals with the information security and that ensure with data integrity

that covers issues related to factors that influence transmission of data.

Integrity - Education - storage : This can be addressed with education such as : Which deal with edcation of user security related issues dealing with data storage.

Integrity - Education - Processing : This can be addressed as : Which deals with the users on security related issues that cover the handling of data.

Integrity - Education - Transmission : The data integrity can be addressed as : which deals with users on security related issues related to factors that influence transmission of data.

Integrity - Technology - Storage : In a class , a control mechanism that alerts the administration when someone with no authority tries to access or corrupt data in a cmputer could be installed.

For ex : use of passwords to access class material.

Integrity - Technology - processing : This can be addressed by having a technolgy such as : which covers the technology used to implement security and the issues that cover the processing of data.

Integrity - Technology - Transmission : assurance that info is not intentionally modified in such a way call into reliabilty , Which covers the technology used to implement security and covers issues related to factors that influence transmission of data.

Availability - Policy - Storage : This can be addressed by having a policy such as : to ensure authorized users access to information in usable format that dealing with data storage.

Availability - Policy - Processing : User access the info in usable format that requires user accounts and passwords and the process the data have access to do so.

Availability - Policy - Transmission : This can be addressed by having a policy such as : user access the info in usable format and covers issues that influence transmission of data.

Availability - Education - Storage : User access the info in usable format Which deals with education of users on security related issues that dealing with data storage.

Availability - Education - Processing : User access the info in usable format and that covers the handling of data which deals with users security issues.

Availability - Education - Transmission : In this , the user will access the information in usabale format and that deals with the security issues of users and covers the issues related to factors that influence transmission of data.

Availability - Technology - Storage : Which covers the technology used to implement security measures to ensure authorized users access to information in usable format in storing data.

Availability - Technology - Processing : ensuring that authorized individuals have both timely and reliable access to data and other resources when needed and this used to covers the technology to implement security measures to processing of data.

Availability - Technology - Transmission : In this also user access the information in usable format and implement security measures with the help of technology that influence the transmission of data.