SlideShare a Scribd company logo
1 of 2
Assignment Overview
Security means to be protected from adversaries, from those
who would do harm, intentionally or otherwise. The Committee
on National Security Systems (CNSS) defines information
security as the protection of information and its critical
elements.
Availability enables users who need to access information to do
so without interference or obstruction and to retrieve that
information in the required format.
Accuracy occurs when information is free from mistakes or
errors and has the value that the end user expects. If
information contains a value different from the user’s
expectations due to the intentional or unintentional modification
of its content, it is no longer accurate.
Authenticity is the quality or state of being genuine or original,
rather than a reproduction or fabrication. Information is
authentic when it is the information that was originally created,
placed, stored, or transferred.
Confidentiality is the quality or state of preventing disclosure
or exposure to unauthorized individuals or systems.
Integrity is the quality or state of being whole, complete, and
uncorrupted. The integrity of information is threatened when the
information is exposed to corruption, damage, destruction, or
other disruption of its authentic state.
Utility is the quality or state of having value for some purpose
or end. Information has value when it serves a particular
purpose. This means that if information is available, but not in a
format meaningful to the end user, it is not useful.
Possession is the quality or state of having ownership or control
of some object or item. Information is said to be in one's
possession if one obtains it, independent of format or other
characteristics. While a breach of confidentiality always results
in a breach of possession, a breach of possession does not
always result in a breach of confidentiality.
Module 1 Video
Case Assignment
Discuss the CNSS security model, which has a dimension
consisting of the components of confidentiality, integrity, and
availability; a second dimension with the components of
processing, storage, and transmission; and a third dimension
dealing with the components of policy and procedures,
technology and education training, and awareness.
Assignment Expectations
Use the CNSS security model to evaluate the protection of
information for some organization, club, or class in which you
are involved. Using the CNSS model, examine each of the
component combinations and discuss how you would address
them in your chosen organization. Present your results in a
word document using a table to show the security module
components and a discussion of how these will be addressed in
the organization, club, or class that you selected to discuss.

More Related Content

Similar to Assignment OverviewSecurity means to be protected from adversari.docx

dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
ams1ams11
 
Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning Continuum
Mansoor Faridi, CISA
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
MargenePurnell14
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
annaielectronicsvill
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 

Similar to Assignment OverviewSecurity means to be protected from adversari.docx (20)

Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdf
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptx
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
25 Ways To Secure Educational Records | Future Education Magazine
25 Ways To Secure Educational Records | Future Education Magazine25 Ways To Secure Educational Records | Future Education Magazine
25 Ways To Secure Educational Records | Future Education Magazine
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning Continuum
 
Availability
AvailabilityAvailability
Availability
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation Assurance
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
Security, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptxSecurity, Compliance & Loss Prevention Part 6.pptx
Security, Compliance & Loss Prevention Part 6.pptx
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
Ch01_MoIS5e_v02.pptx business business business business
Ch01_MoIS5e_v02.pptx business business business businessCh01_MoIS5e_v02.pptx business business business business
Ch01_MoIS5e_v02.pptx business business business business
 

More from howard4little59962

assignment mental health disordersA 38-year-old woman presen.docx
assignment mental health disordersA 38-year-old woman presen.docxassignment mental health disordersA 38-year-old woman presen.docx
assignment mental health disordersA 38-year-old woman presen.docx
howard4little59962
 
Assignment Marking Criteria and FeedbackStrengths of this as.docx
Assignment Marking Criteria and FeedbackStrengths of this as.docxAssignment Marking Criteria and FeedbackStrengths of this as.docx
Assignment Marking Criteria and FeedbackStrengths of this as.docx
howard4little59962
 
Assignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docxAssignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docx
howard4little59962
 
Assignment Legislation Grid and TestimonyAdvocacy Statement.docx
Assignment Legislation Grid and TestimonyAdvocacy Statement.docxAssignment Legislation Grid and TestimonyAdvocacy Statement.docx
Assignment Legislation Grid and TestimonyAdvocacy Statement.docx
howard4little59962
 
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docxAssignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
howard4little59962
 
Assignment Leadership Style What Do People Do When They Are Leadin.docx
Assignment Leadership Style What Do People Do When They Are Leadin.docxAssignment Leadership Style What Do People Do When They Are Leadin.docx
Assignment Leadership Style What Do People Do When They Are Leadin.docx
howard4little59962
 
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docxAssignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
howard4little59962
 
Assignment Leadership and Strategic PlanningIn this assignm.docx
Assignment Leadership and Strategic PlanningIn this assignm.docxAssignment Leadership and Strategic PlanningIn this assignm.docx
Assignment Leadership and Strategic PlanningIn this assignm.docx
howard4little59962
 
Assignment Lab Assignment Assessing the Genitalia and Rectum.docx
Assignment Lab Assignment Assessing the Genitalia and Rectum.docxAssignment Lab Assignment Assessing the Genitalia and Rectum.docx
Assignment Lab Assignment Assessing the Genitalia and Rectum.docx
howard4little59962
 
Assignment Keys Black The requirements of that .docx
Assignment Keys Black The requirements of that .docxAssignment Keys Black The requirements of that .docx
Assignment Keys Black The requirements of that .docx
howard4little59962
 
Assignment Journal Entry – Media and SexismMany marketing effor.docx
Assignment Journal Entry – Media and SexismMany marketing effor.docxAssignment Journal Entry – Media and SexismMany marketing effor.docx
Assignment Journal Entry – Media and SexismMany marketing effor.docx
howard4little59962
 
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docxAssignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
howard4little59962
 
Assignment is due by Today by 6pm ZERO Plagiarism include references.docx
Assignment is due by Today by 6pm ZERO Plagiarism include references.docxAssignment is due by Today by 6pm ZERO Plagiarism include references.docx
Assignment is due by Today by 6pm ZERO Plagiarism include references.docx
howard4little59962
 
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docx
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docxAssignment is due by 600 PM Eastern Time (about 8 hours from now).docx
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docx
howard4little59962
 

More from howard4little59962 (20)

assignment mental health disordersA 38-year-old woman presen.docx
assignment mental health disordersA 38-year-old woman presen.docxassignment mental health disordersA 38-year-old woman presen.docx
assignment mental health disordersA 38-year-old woman presen.docx
 
Assignment Marking Criteria and FeedbackStrengths of this as.docx
Assignment Marking Criteria and FeedbackStrengths of this as.docxAssignment Marking Criteria and FeedbackStrengths of this as.docx
Assignment Marking Criteria and FeedbackStrengths of this as.docx
 
Assignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docxAssignment Linux ForensicsResearch information about Linux .docx
Assignment Linux ForensicsResearch information about Linux .docx
 
Assignment Legislation Grid and TestimonyAdvocacy Statement.docx
Assignment Legislation Grid and TestimonyAdvocacy Statement.docxAssignment Legislation Grid and TestimonyAdvocacy Statement.docx
Assignment Legislation Grid and TestimonyAdvocacy Statement.docx
 
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docxAssignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy State.docx
 
Assignment Leadership Style What Do People Do When They Are Leadin.docx
Assignment Leadership Style What Do People Do When They Are Leadin.docxAssignment Leadership Style What Do People Do When They Are Leadin.docx
Assignment Leadership Style What Do People Do When They Are Leadin.docx
 
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docxAssignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
Assignment Legislation Comparison Grid and TestimonyAdvocacy S.docx
 
Assignment Leadership and Strategic PlanningIn this assignm.docx
Assignment Leadership and Strategic PlanningIn this assignm.docxAssignment Leadership and Strategic PlanningIn this assignm.docx
Assignment Leadership and Strategic PlanningIn this assignm.docx
 
Assignment Lab Assignment Assessing the Genitalia and Rectum.docx
Assignment Lab Assignment Assessing the Genitalia and Rectum.docxAssignment Lab Assignment Assessing the Genitalia and Rectum.docx
Assignment Lab Assignment Assessing the Genitalia and Rectum.docx
 
Assignment Keys Black The requirements of that .docx
Assignment Keys Black The requirements of that .docxAssignment Keys Black The requirements of that .docx
Assignment Keys Black The requirements of that .docx
 
Assignment Journal Entry – Media and SexismMany marketing effor.docx
Assignment Journal Entry – Media and SexismMany marketing effor.docxAssignment Journal Entry – Media and SexismMany marketing effor.docx
Assignment Journal Entry – Media and SexismMany marketing effor.docx
 
Assignment IT Infrastructure PoliciesLearning Objectives and Ou.docx
Assignment IT Infrastructure PoliciesLearning Objectives and Ou.docxAssignment IT Infrastructure PoliciesLearning Objectives and Ou.docx
Assignment IT Infrastructure PoliciesLearning Objectives and Ou.docx
 
Assignment IT Infrastructure PoliciesLearning Objectives and .docx
Assignment IT Infrastructure PoliciesLearning Objectives and .docxAssignment IT Infrastructure PoliciesLearning Objectives and .docx
Assignment IT Infrastructure PoliciesLearning Objectives and .docx
 
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docxAssignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
Assignment is dues Tuesday 27th of August by 1200 pm eastern ti.docx
 
Assignment is due Wednesday by 3pm ZERO Plagiarism include reference.docx
Assignment is due Wednesday by 3pm ZERO Plagiarism include reference.docxAssignment is due Wednesday by 3pm ZERO Plagiarism include reference.docx
Assignment is due Wednesday by 3pm ZERO Plagiarism include reference.docx
 
Assignment is due by Today by 6pm ZERO Plagiarism include references.docx
Assignment is due by Today by 6pm ZERO Plagiarism include references.docxAssignment is due by Today by 6pm ZERO Plagiarism include references.docx
Assignment is due by Today by 6pm ZERO Plagiarism include references.docx
 
Assignment Interview Question on Patriotism and Military Histor.docx
Assignment Interview Question on Patriotism and Military Histor.docxAssignment Interview Question on Patriotism and Military Histor.docx
Assignment Interview Question on Patriotism and Military Histor.docx
 
Assignment Interview PreparationPart IUse the Internet to loc.docx
Assignment Interview PreparationPart IUse the Internet to loc.docxAssignment Interview PreparationPart IUse the Internet to loc.docx
Assignment Interview PreparationPart IUse the Internet to loc.docx
 
Assignment International trade and interprises··Impor.docx
Assignment International trade and interprises··Impor.docxAssignment International trade and interprises··Impor.docx
Assignment International trade and interprises··Impor.docx
 
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docx
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docxAssignment is due by 600 PM Eastern Time (about 8 hours from now).docx
Assignment is due by 600 PM Eastern Time (about 8 hours from now).docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Assignment OverviewSecurity means to be protected from adversari.docx

  • 1. Assignment Overview Security means to be protected from adversaries, from those who would do harm, intentionally or otherwise. The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements. Availability enables users who need to access information to do so without interference or obstruction and to retrieve that information in the required format. Accuracy occurs when information is free from mistakes or errors and has the value that the end user expects. If information contains a value different from the user’s expectations due to the intentional or unintentional modification of its content, it is no longer accurate. Authenticity is the quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. Confidentiality is the quality or state of preventing disclosure or exposure to unauthorized individuals or systems. Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. Utility is the quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. This means that if information is available, but not in a format meaningful to the end user, it is not useful.
  • 2. Possession is the quality or state of having ownership or control of some object or item. Information is said to be in one's possession if one obtains it, independent of format or other characteristics. While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality. Module 1 Video Case Assignment Discuss the CNSS security model, which has a dimension consisting of the components of confidentiality, integrity, and availability; a second dimension with the components of processing, storage, and transmission; and a third dimension dealing with the components of policy and procedures, technology and education training, and awareness. Assignment Expectations Use the CNSS security model to evaluate the protection of information for some organization, club, or class in which you are involved. Using the CNSS model, examine each of the component combinations and discuss how you would address them in your chosen organization. Present your results in a word document using a table to show the security module components and a discussion of how these will be addressed in the organization, club, or class that you selected to discuss.