You have been asked by upper management to prepare a paper on information security specifically related to confidentiality, integrity, and availability, along with trusted computing. Your paper should demonstrate that you are able to understand and apply these common information security concepts and must include an analysis that addresses the breadth and coverage of information security regarding people, processes, and technologies.
Submit a Five- to Six -page paper that meets the requirements above. Your well-written response should be formatted according to APA Requirements, with any sources properly cited.
1. Textbook reference is attached (refer to Chapters 1, 13, 14 & 15 in Computer Security: Principles and Practice).
2. Plagiarism policy is strict, please provide inline citations for all the reference used (must have atleast 2 scholarly reference other than the text book).