Trust, CIA Triad, and Safeguards in Information Security
Mar 14, 2026 / · 5 min read · information security information assurance organizational security ISO27001 cryptography access control physical security trust ·Trust and Safeguards in Information Security: An Organizational Perspective The word "Trust" is defined as related to information security. Based on ones understanding of securing your environment, what are some of the common safeguards is recommend to ensure trust is viable in an organization? Defining Trust in …
Read MorePersonnel and Physical Security in Information Assurance
Mar 13, 2026 / · 4 min read · information assurance personnel security physical security security policies environmental security access control background check ·Personnel and Physical Security in Information Assurance Personnel Security Process and procedures are needed to protect personnel security as Jacobs (2015) points out. The employee responsibilities need to be defined, and the employee must qualify for the role so that the risk is reduced from theft, fraud, or misuse …
Read MoreUnderstanding the Various Branches of Information Security
Nov 3, 2025 / · 5 min read · information security cybersecurity security layers defense in depth information assurance network security physical security security management ·Understanding the Various Branches of Information Security Introduction The purpose of information security is to protect a companies or organization's valuable assets as Peltier (2013) points out. Information security includes securing computer hardware and software and information or data. The information security …
Read MoreCommon Issues with Security Policy Implementation
Oct 29, 2025 / · 4 min read · security policy policy implementation security awareness organizational change clean desk physical security culture change compliance ·Common Issues with Security Policy Implementation Original Query Discuss common issues with implementation of security policies and Discuss include common issues and possible mitigations to ensure policy can be enforced. Common Implementation Issues Implementation issues happen with security policies. Some of the …
Read MorePhysical Security Failure Points and Mitigation Strategies
Oct 24, 2025 / · 4 min read · physical security access control vulnerability study information security security management risk mitigation facility protection ·Common Points of Failure and Strategies to Mitigate Physical Security Deficiencies Layered Defense Approach The nature of physical security ought to be like concentric rings or layers of defense with requirements for access that gets more difficult the closer one get to the center of the rings as described by Peltier …
Read MorePhysical Security Models: Features and Functionality Compared
Oct 23, 2025 / · 5 min read · physical security information security vulnerability study access control security layers risk assessment security management ·Evaluating the Features and Functionality of Various Physical Security Models Three Levels of Information Security Logical security, physical security, and premise security are the three levels of information security as described by Vacca (2013). Logical security protects data stored on computers from software and …
Read More