A brief analysis of CIA Triangle, threat and vulnerabilities, risk mitigation and legislations
Information security and data integrity is one of the major difficulties facing organizations of any scale. One of the frameworks used in analyzing security related problems and solutions are the CIA Triangle. However the constantly evolving threat environment has necessitated a more robust and intellectual method, that can address short comings effectively. Security threats and vulnerabilities are a challenge for organizations, both going hand in hand, with each threat corresponding to a particular vulnerability. Cyber crime legislations provide legal support for organizations in their endeavor for their information security. Cyber crime legislation is however a relatively new and developing field, and countries have ...