Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Republic of the Philippines

Laguna State Polytechnic University


ISO 9001:2015 Certified Province of Laguna
Level I Institutionally Accredited

Name: Alfred Danielle A. Alvarez


Section: BSIT 3-SMP

Performance Tasks

Please answer the following set of questions/statements.

Note that all the submissions will be uploaded to our Google Classroom (Classwork). Submit the file with
the filename Performance Task 1_ITEP 311_Fullname (example: Performance Task 1_ITEP 311_Dela Cruz
Juan).

1. If you were an information security expert in the future, discuss the importance of the following
to your job.
a. Confidentiality
 It is a fundamental component in the development of trust. Because it protects
sensitive and private information from illegal access and modification and makes
sure that only authorized persons have access to confidential information,
confidentiality is crucial. It also serves as a set of guidelines that restricts access to
data. People's reputations may be safeguarded, and their confidence may increase.
This also guarantees that the law is being followed. When and if necessary, personal
data should be updated and kept in a secure location. Everyone has the right to limit
who else has access to specific categories of information about them. As personal
information might be deliberately misused, it is important to respect each individual.
b. Integrity
 Integrity comprises assuring information non-repudiation and validity as well as
acting as a barrier against improper information alteration or destruction. Integrity
is crucial because it ensures and secures the searchability and source-traceability of
your data. This comprises the goal of preserving data's consistency, precision, and
dependability across its entire existence. Data must not be altered while in transit,
and security measures must be taken to prevent unwanted data changes. For
instance, a hacker may take data and alter it before transferring it to the intended
recipient in a data breach that undermines integrity. Authorized users can be
stopped from making unauthorized changes with access control and strict
authentication.
c. Availability
 It is crucial because it guarantees that systems, applications, and data are available
Republic of the Philippines
Laguna State Polytechnic University
ISO 9001:2015 Certified Province of Laguna
Level I Institutionally Accredited

and reachable to authorized users at all times, including during power outages and
natural catastrophes. To guarantee that crucial business processes continue without
interruption, networks, systems, and applications must be continuously available.
Redundancy (in servers, networks, applications, and services), fault tolerance (in
hardware), regular software patches and system upgrades, keeping backups and
backup copies, and disaster recovery are some of the techniques used to ensure data
and application availability.
(provide an answer with minimum of 100 words and maximum to 150 words for a, b and c)

2. If you were an IA practitioner in a big company/organization in your future job. What processes
will you be implemented for the assurance and security of network, data and information of the
company/organization? (provide an answer with minimum of 125 words and maximum to 150)
 Organizations value IA because it makes sure that user data is secure during storage
and transport. As more and more company transactions and procedures depend on
digital handling techniques, information assurance has grown in importance as a part
of data security. The identification of vulnerabilities that could allow threats to affect
a company's entire infrastructure, specific systems, or operational procedures is
greatly aided by risk assessments. A risk assessment for information assurance tells
you how likely it is that a threat will take advantage of a weakness in an asset and
what kind of financial, operational, compliance, or technological impact it might have.
Organizations can create an information assurance management plan for minimizing,
preventing, or eliminating possible threats by using a trustworthy, objective risk
assessment.

3. For various data/information hacking or fishing happening on different online platforms such
as social media and online systems, discuss how you will protect your own data and
information to prevent others from using your personal data/information for illegal activities.
Also, discuss what will be your reminders to everyone how will they protect their personal
data/information to prevent such things. (Provide an answer with minimum of 125 words and
maximum to 150 words.)
 We must protect our devices. Update your operating system, internet browser, and
security software. Often, hackers search for vulnerabilities to exploit before software
firms can patch them. One piece of advice is to make sure your accounts are secure.
Establish strong passwords and utilize them; lengthening a password is typically the
simplest way to do so. Multi-factor authentication is an additional option. Accounts
now provide additional protection by needing two or more credentials to log in. If
scammers do manage to get their hands on your username and password, multi-
factor authentication makes it more difficult for them to access your accounts. To
protect your data, make a backup. Making a second copy of each file is what is meant
by "backing up" your data. In this manner, you will always have access to your files in
the event of an incident, such as a virus, a device crash, or hacking.

You might also like