Description
How can the CIA triad—confidentiality, integrity, and availability—help keep an organization’s important information safe and secure?
—————————————————————————
What are some common causes of data integrity issues in organizations, including human errors, transfer errors, cyber threats, and compromised hardware?
—————————————————————————
What are the factors that influence changes in a company, and how do they impact operations and the need for policy reviews?
—————————————————————————
What are some methods organizations can use to evaluate their information security programs, and who might conduct these evaluations?
Assignment 1
Deadline: Tuesday 6/10/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name:
ID:
CRN:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
LO1: Apply
effective, proper,
Question One
How can the CIA triad—confidentiality, integrity, and availability—help keep an
organization’s important information safe and secure?
and state-of-theart security tools
and technologies.
2 Marks
Answer:
Question Two
Pg. 02
Learning
Outcome(s):
2 Marks
Question Two
LO1: Apply
effective, proper,
and state-of-the-
What are some common causes of data integrity issues in organizations, including
human errors, transfer errors, cyber threats, and compromised hardware?
art security tools
and technologies.
Answer:
Question Three
Pg. 03
Learning
Outcome(s):
LO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
2 Marks
Question Three
What are the factors that influence changes in a company, and how do they
impact operations and the need for policy reviews?
Answer:
Question Four
Pg. 04
Learning
Outcome(s):
LO3: Develop
security policies
and put in place
an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
2 Marks
Question Four
What are some methods organizations can use to evaluate their information
security programs, and who might conduct these evaluations?
Answer:
Purchase answer to see full
attachment