Trust, CIA Triad, and Safeguards in Information Security
Mar 14, 2026 / · 5 min read · information security information assurance organizational security ISO27001 cryptography access control physical security trust ·Trust and Safeguards in Information Security: An Organizational Perspective The word "Trust" is defined as related to information security. Based on ones understanding of securing your environment, what are some of the common safeguards is recommend to ensure trust is viable in an organization? Defining Trust in …
Read MorePersonnel and Physical Security in Information Assurance
Mar 13, 2026 / · 4 min read · information assurance personnel security physical security security policies environmental security access control background check ·Personnel and Physical Security in Information Assurance Personnel Security Process and procedures are needed to protect personnel security as Jacobs (2015) points out. The employee responsibilities need to be defined, and the employee must qualify for the role so that the risk is reduced from theft, fraud, or misuse …
Read MoreTypes of Security Architecture and Design Models Explained
Oct 25, 2025 / · 7 min read · security architecture information security security models access control integrity models confidentiality enterprise architecture security policy ·Appraise the Various Types of Security Architecture & Design Models Security Architecture Overview Security architecture is the view of the overall system architecture from a security perspective. Security architecture provides insight into the security services, mechanisms, technologies, and features that can be used …
Read MorePhysical Security Failure Points and Mitigation Strategies
Oct 24, 2025 / · 4 min read · physical security access control vulnerability study information security security management risk mitigation facility protection ·Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies Layered Defense Approach The nature of physical security ought to be like concentric rings or layers of defense with requirements for access that gets more difficult the closer one get to the center of the rings as described by Peltier …
Read MorePhysical Security Models: Features and Functionality Compared
Oct 23, 2025 / · 5 min read · physical security information security vulnerability study access control security layers risk assessment security management ·Evaluating the Features and Functionality of Various Physical Security Models Three Levels of Information Security Logical security, physical security, and premise security are the three levels of information security as described by Vacca (2013). Logical security protects data stored on computers from software and …
Read MoreCryptology Methods in Organizations, CAC vs. User/Password This text explores the different cryptology methods used for authentication within organizations. It compares the Common Access Card (CAC), used by federal agencies, with traditional username and password systems. CAC: The CAC offers two-factor authentication …
Read More