Show simple item record

dc.contributor.authorOmollo, Richard
dc.date.accessioned2025-01-23T15:47:45Z
dc.date.available2025-01-23T15:47:45Z
dc.date.issued2024-04
dc.identifier.urihttp://ir.jooust.ac.ke/handle/123456789/14220
dc.description.abstractRichard Omollo This paper appreciates the basic tenets of information as defined by the CIA and discusses the various Information security business models. Information security has been defined as the preservation of confidentiality, integrity, and availability, also known as the CIA triad, of information by guarding against unauthorized access, use, disclosure, disruption, alteration, and destruction of information and information systems or assets. It further simplified information security by ensuring information confidentiality, integrity, and availability. It is the aspect of ensuring information is only accessible to the right persons, protecting information from unauthorized modifications, and ensuring information is available to authorized users whenever they need it. Existing Information security business models serve as a guide in comprehending the challenges to confidentiality, integrity, and availability of known systems. This research study appreciated various business models and offered their comparative review.en
dc.language.isoenen
dc.publisherIEEE-SEMen
dc.subjectInformation Securityen
dc.subjectInformation Modelsen
dc.subjectConfidentialityen
dc.subjectIntegrityen
dc.titleA Comparative Review of Business Models in Information Securityen
dc.typeArticleen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record