Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Name JABONE, NICO T.

Date OCT 06, 2020


Section CDI 6C 1:30-TF Score

ASSIGNMENT # 4A
THE CIA TRIANGLE
A. OBJECTIVE: Apply the security principles of CIA triangle in protecting confidential information
stored in the computer system of a police organization/office.

B. PROCEDURE (refer the instructions in the assignment page)

C. OUTPUT

CONFIDENTIALITY
1. AS A POLICE RECORD OFFICER, I
WILL CREATE A RULE WHERE ALL
OFFICERS WILL ONLY HAVE
“LIMITED ACCESS” ON THE DATAS
STORED WITHIN THE COMPUTER INTEGRITY
AND ONLY AUTHORIZED 1. AS A POLICE RECORD OFFICER, I
PERSONNEL CAN ACCESS THE WILL ENSURE THE INTEGRITY OF
SENSITIVE INFORMATION. THE CONFIDENTIAL FILES BY
“AUDITING THE CHANGES” I MADE
IN THE COMPUTER FILES
2. OF COURSE TO SUPPORT MY EVERYTIME.
LIMITED ACCESS RULE, I WILL
PROVIDE CONFIDENTIALITY POLICY 2. STRICTLY FOLLOW THE PROCEDURE
HANDBOOK TO THE OFFICER FOR INCLUDING THE CHAIN OF
THEM TO KNOW WHAT COMMAND IN TERMS OF HANDLING
INFORMATIONS THEY CAN AND THE CONFIDENTIAL FILES.
CAN’T HAVE AN ACCESS.

AVAILABILITY
1. TO ENSURE THE AVAILABITY OF THE
CONFIDENTIAL FILES UNDER MY
CUSTODY, I WILL ALWAYS CREATE A
BACKUP OF THOSE FILES TO
SECURE THE INFORMATION WHEN
THE MAIN FILES CORRUPTED OR
DISAPPEAR UNDER UNEXPECTED
CIRCUMSTANCES.

2. I WILL ENSURE THAT THE


COMPUTER HOLDING THE
CONFIDENTIAL FILES THAT UNDER
MY CUSTODY IS PLACED WITHIN A
VERY SECURED ROOM TO PROTECT
IT FROM EXTERNAL FACTORS LIKE
NATURAL PHENOMENON.

by cdkWorks/2020

You might also like