________________________________________
Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook.
Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room. We are going to talk about three main areas of accountability concerning Information Security. …show more content…
In any location of business, there is a security system agency which takes in charge all information and physical controls of the local administration and associated rooms. As it is said by other writers, some businesses do not have physical security and someone responsible for it. This kind of security is related to having a control tower where someone: a guard, is available at this post, it is like a radar operating just to control coming enemies. All these is for areas like big buildings of factories, or campus for soldiers like Police Academy, etc. This is a function with tools/gadgets like micro-cameras, movement-sensor, heat detector, etc. There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence.
D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information. And the Utility, which is the availability to use the stored