Professional Documents
Culture Documents
Assignment # 4A The Cia Triangle: CDI 6C 1:30-TF
Assignment # 4A The Cia Triangle: CDI 6C 1:30-TF
ASSIGNMENT # 4A
THE CIA TRIANGLE
A. OBJECTIVE: Apply the security principles of CIA triangle in protecting confidential information
stored in the computer system of a police organization/office.
C. OUTPUT
CONFIDENTIALITY
1. AS A POLICE RECORD OFFICER, I
WILL CREATE A RULE WHERE ALL
OFFICERS WILL ONLY HAVE
“LIMITED ACCESS” ON THE DATAS
STORED WITHIN THE COMPUTER INTEGRITY
AND ONLY AUTHORIZED 1. AS A POLICE RECORD OFFICER, I
PERSONNEL CAN ACCESS THE WILL ENSURE THE INTEGRITY OF
SENSITIVE INFORMATION. THE CONFIDENTIAL FILES BY
“AUDITING THE CHANGES” I MADE
IN THE COMPUTER FILES
2. OF COURSE TO SUPPORT MY EVERYTIME.
LIMITED ACCESS RULE, I WILL
PROVIDE CONFIDENTIALITY POLICY 2. STRICTLY FOLLOW THE PROCEDURE
HANDBOOK TO THE OFFICER FOR INCLUDING THE CHAIN OF
THEM TO KNOW WHAT COMMAND IN TERMS OF HANDLING
INFORMATIONS THEY CAN AND THE CONFIDENTIAL FILES.
CAN’T HAVE AN ACCESS.
AVAILABILITY
1. TO ENSURE THE AVAILABITY OF THE
CONFIDENTIAL FILES UNDER MY
CUSTODY, I WILL ALWAYS CREATE A
BACKUP OF THOSE FILES TO
SECURE THE INFORMATION WHEN
THE MAIN FILES CORRUPTED OR
DISAPPEAR UNDER UNEXPECTED
CIRCUMSTANCES.
by cdkWorks/2020