top of page
The CIA Triad
The attached article will discuss the three elements of the CIA triad: confidentiality, integrity, and availability , and how this model relates to information security. Here, we will also consider a few basic techniques used to enforce the pillars of the triad and promote business continuity. Protecting data and providing reliable services increasingly depends on these components as the digital space expands.
NOAH JENNINGS
Apr 8, 20251 min read


Protecting Availability
Let us imagine that I am the Chief Information Security Officer (CISO) for a company that is publicly traded in venues like the NASDAQ. My new position makes me responsible for developing, implementing, and enforcing security policies that protect data and services that are critical to my company and our clients. After a thorough evaluation of our assets and the risks to those assets, my first step would be to ensure that the available servers are distributing their workloa
NOAH JENNINGS
Apr 8, 20251 min read


QOP
We introduce the Quality Organization Profile (QOP) policy, a security policy designed to cover the bases for a secure Information Technology (IT) environment. While there are no perfect solutions to securing IT networks, the QOP policy offers guidance and methods to align with the National Institute of Standards and Technology’s (NIST) conventions and prevent security breaches. This paper will leverage security issues such as risk analysis and control selection to drive th
NOAH JENNINGS
Mar 11, 20251 min read


bottom of page
