Information security
Compare and contrast common security models
Information security models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption. Your task for this assignment is:
Introduce the concept of using information security models (why are they important).
Explain that some security architecture models are implemented into computer hardware and software, some are implemented as policies and practices, and some encompass both.
Describe, compare, and contrast TWO common security models.
Conclude with your recommendation of which model would be best to use in your organization.
Submission Requirements
Format: Microsoft Word
Font: Arial, 12-Point, Double- Space
Citation Style: APA
Length: 2–3 pages (plus a cover sheet)
Proofread and edit for spelling, grammar, punctuation, proper wording, etc
……………………….Answer preview………………………….
In this age of the internet, it is vital to protect digital information from unauthorized access. Information Security models are templates used to authenticate the overall security process. It provides a precise set of instructions computers have to follow to administer fundamental information security functions and procedures as outlined in the security policy.These models offer a CIA triad which refers to Confidentiality, Integrity, and Availability of data and information stored in the system…………………………………
APA
683 words