Describe in detail an organization you are familiar with that is need of a security review. This could be a company you work for, a fictitious company, or an organization you are associated with. You will use this company and scenario throughout the class. As the security analyst in charge of ensuring a solid security posture for the organization, describe the CIA triad with respect to information security, and describe how you would implement a security program for your chosen organization with each pillar of the triad in mind. Focus the discussion with the following questions in mind: What would you do to protect the Confidentiality of company information? What would you do to protect the Integrity of company information? What would you do to protect the Availability of company resources? Describe what you consider to be a secure infrastructure for the organization to enable the implementation of the ideas that were previously described with respect to the CIA triad. Focus the discussion on at least 3 different security domains with security concerns.(You can use the CISSP 10 domains as a basis) Please submit your assignment. For assistance with your assignment, please use your text, Web resources, and all course materials.


The organization chosen for this security review is a fictitious technology company called XYZ Tech Solutions. As the security analyst in charge of ensuring a solid security posture for this organization, this assignment will describe the implementation of a security program with the CIA triad (Confidentiality, Integrity, and Availability) in mind. The focus will be on how to protect the confidentiality of company information, maintain the integrity of company information, and ensure the availability of company resources. Additionally, a secure infrastructure will be described to enable the implementation of these ideas, focusing on three different security domains.

Protecting the Confidentiality of Company Information:

To protect the confidentiality of company information, several measures would be implemented. Firstly, a strong access control system would be established. This would involve ensuring that each employee has their own unique login credentials and that access permissions are assigned on a need-to-know basis. Additionally, multi-factor authentication would be mandated for accessing sensitive information or systems.

Encryption would also be employed to protect the confidentiality of data both at rest and in transit. This would involve using strong encryption algorithms and ensuring that encryption keys are well-managed. Regular security awareness training would be conducted to educate employees about the importance of safeguarding confidential information and the best practices for doing so.

Protecting the Integrity of Company Information:

Maintaining the integrity of company information is crucial to ensure that it is accurate and reliable. One measure that would be implemented is data backups and disaster recovery plans. Regular backups would be taken to ensure that in the event of data corruption or loss, the organization can restore the data to its original state. These backups would be securely stored and tested periodically to ensure their effectiveness.

Another measure to protect information integrity is the implementation of secure development practices. This would involve following industry best practices, such as using secure coding techniques, conducting regular code reviews, and employing rigorous testing methodologies. Additionally, change management processes would be established to ensure that any modifications to systems or applications are properly tested, approved, and documented.

Protecting the Availability of Company Resources:

Ensuring the availability of company resources is crucial for business continuity. To achieve this, a robust network infrastructure would be implemented, including redundant hardware, load balancing, and failover mechanisms. Regular monitoring and performance tuning would be conducted to identify and mitigate any bottlenecks or vulnerabilities that could impact resource availability.

Furthermore, a comprehensive incident response plan would be established to effectively respond to any disruptions or security incidents. This plan would include defined roles and responsibilities, clear escalation procedures, and regular drills to test the effectiveness of the plan. The organization would also establish partnerships with vendors and service providers to leverage their expertise and resources in case of emergencies.

Secure Infrastructure for Implementation:

To enable the implementation of the ideas described above, a secure infrastructure would be necessary. This infrastructure would include three different security domains: network security, physical security, and application security. In terms of network security, firewalls, intrusion detection and prevention systems, and virtual private networks (VPNs) would be implemented to secure the network perimeter and ensure secure communication.

Physical security measures, such as access controls, surveillance cameras, and alarm systems, would be implemented to protect the organization’s physical assets, such as data centers and offices. Application security would involve conducting regular vulnerability assessments and penetration tests to identify and fix security flaws in software applications. Additionally, strong authentication mechanisms, such as biometrics or tokens, would be employed to secure access to critical applications.


In conclusion, implementing a security program for XYZ Tech Solutions involves protecting the confidentiality, integrity, and availability of company information. Measures such as access control, encryption, data backups, disaster recovery plans, secure development practices, network infrastructure, physical security, and application security would be implemented. This would ensure that the organization has a solid security posture and is adequately prepared to handle security threats and incidents.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer