A Comparative Review of Business Models in Information Security

dc.contributor.authorOmollo, Richard
dc.date.accessioned2025-01-23T15:47:45Z
dc.date.available2025-01-23T15:47:45Z
dc.date.issued2024-04
dc.description.abstractRichard Omollo This paper appreciates the basic tenets of information as defined by the CIA and discusses the various Information security business models. Information security has been defined as the preservation of confidentiality, integrity, and availability, also known as the CIA triad, of information by guarding against unauthorized access, use, disclosure, disruption, alteration, and destruction of information and information systems or assets. It further simplified information security by ensuring information confidentiality, integrity, and availability. It is the aspect of ensuring information is only accessible to the right persons, protecting information from unauthorized modifications, and ensuring information is available to authorized users whenever they need it. Existing Information security business models serve as a guide in comprehending the challenges to confidentiality, integrity, and availability of known systems. This research study appreciated various business models and offered their comparative review.en
dc.identifier.urihttp://ir.jooust.ac.ke/handle/123456789/14220
dc.language.isoenen
dc.publisherIEEE-SEMen
dc.subjectInformation Securityen
dc.subjectInformation Modelsen
dc.subjectConfidentialityen
dc.subjectIntegrityen
dc.titleA Comparative Review of Business Models in Information Securityen
dc.typeArticleen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Omollo_ A Comparative Review of Business Models in Information Security.pdf
Size:
946.91 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: