{"id":39188,"date":"2022-09-03T07:23:17","date_gmt":"2022-09-03T07:23:17","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=39188"},"modified":"2022-09-03T07:23:54","modified_gmt":"2022-09-03T07:23:54","slug":"why-is-it-necessary-to-define-policy-elements","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/why-is-it-necessary-to-define-policy-elements\/","title":{"rendered":"Why is it necessary to define policy elements?"},"content":{"rendered":"<p>Information Security Policies<br \/>\n135 words for each question<\/p>\n<p>1. Why is it necessary to define policy elements?<\/p>\n<p>2. Discuss the terms confidentiality, integrity, and availability as they relate to information systems. Why are they important?<br \/>\n1. Why is it necessary to define policy elements?<br \/>\nDefining policy elements is necessary for the policy users to have a  clear and concise understanding of what is required (Mathias, 2009). Proper definitions ensure that there is no room left guesswork where the users do not know the policy&#8217;s true intentions. In this way, the reader gets an accurate picture of these policy elements and their significance in achieving the policy&#8217;s primary objectives. Furthermore, the researchers get to know how these policy elements will interact with overall organizational procedures and techniques, thus avoiding any unnecessary collisions or even violations (Mathias, 2009). Considering the development of policy included the policy audience, the final production and especially the elements need to be defined to ensure everything has been included in the audience. Policies need to be tailored to meet particular needs, and proper definitions provide an understanding of how the needs will be met.<br \/>\n2. Discuss the terms of confidentiality, integrity, and availability as they relate to information systems. Why are they important?<br \/>\nConfidentiality encompasses particular rules to be followed to limit access to information. Integrity entails the assurance that the information in a system is accurate and can be trusted. Availability entails guaranteeing that the authorized parties will have reliable access to the right information (Smart Eye Technology, 2019). These elements form the CIA triad model that has been designed for the maintenance of privacy policies in information security within an organization. The three form fundamental objectives to information security. Therefore, for information systems to ensure that their systems are secured enough, their security measures need to be provided confidentiality, availability and integrity (Smart Eye Technology, 2019). The three attributes are important as they address a distinct aspect of protecting information within an information system. The model aids in bringing together the attributes of an information security program that ensure achievement of higher security levels.<\/p>\n<p>References<br \/>\nMathias, C. (2009). Elements of an effective security policy. Retrieved from https:\/\/www.networkworld.com\/article\/2234556\/elements-of-an-effective-security-policy.html<br \/>\nSmart Eye Technology. (2019, December 9). Confidentiality, integrity, &amp; availability: Basics of information security. Retrieved from https:\/\/smarteyetechnology.com\/confidentiality-integrity-availability-basics-of-information-security\/#:~:text<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Policies 135 words for each question 1. Why is it necessary to define policy elements? 2. Discuss the terms confidentiality, integrity, and availability as they relate to information\u2026<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3949],"tags":[4107],"class_list":["post-39188","post","type-post","status-publish","format-standard","hentry","category-essaybishops","tag-why-is-it-necessary-to-define-policy-elements"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/39188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=39188"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/39188\/revisions"}],"predecessor-version":[{"id":39191,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/39188\/revisions\/39191"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=39188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=39188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=39188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}