Business > CASE STUDY > ISSC660 Wk4.docx ISSC660 Week 4 Assignment ISSC660 Abstract Security policies within (All)
ISSC660 Wk4.docx ISSC660 Week 4 Assignment ISSC660 Abstract Security policies within an organization require analysis much like any other business function does. To accomplish this, security mod... elling can be used to check the policy for any inconsistencies or help produce documentation regarding the policy. Along with modelling, security-related standards help to govern the implementation of a security policy. This paper will discuss these security modelling techniques and briefly explain security-related standards governing information security. Keywords: security, modelling. standards Security Modelling and Standards Security modelling s primary focus can be stated as either being on œconfidentiality via access controls or on information integrity (Jacobs, 2016, p. 251). Security models come in a variety of forms, with there being five main models which are defined, and separated into two c. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 22, 2021
Number of pages
3
Written in
This document has been written for:
Uploaded
Jul 22, 2021
Downloads
0
Views
62
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·