Analysis Of The CIA Triad, Confidentiality: A Standard For Information Security

Decent Essays
CIA Triad, Confidentiality, Integrity and Availability is a standard for information security.
Confidentiality seeks to prevent the unauthorized disclosure of the information. Data is accessible to users who have formal access approvals, security clearances and on need to know basis. In nutshell, Confidentiality prevents read access to data and you need to have permissions or authority to do so.
Integrity seeks to prevent unauthorized modification of the data. Integrity prevents write access to the data. Integrity ensures quality and consistency of the data.
Availability, ensures that the information is available when needed. Availability demands both hardware and software to be available without any interruption.

Related Documents

  • Decent Essays

    “Lester Coleman, a former agent for the Defense Intelligence Agency (DIA), worked for the DIA in the Middle East, including the DEA office in Nicosia from where the drug smuggling operation was monitored” (Stich). Coleman worked with DEA agent-in-charge Michael Hurley who monitored the CIA-DEA drug route. Coleman and another CIA source, Oswald LeWinter, claim that Hurley was the DEA agent-in-charge of the area including the famous CIA drug trafficking at Arkansas. While working with Hurley, Coleman also found that the DEA was selling software stolen by Justice Department officials to a company dealing drugs and arms and multiple countries including Jordan, Iran, Iraq, Egypt, Turkey and Pakistan. Coleman co-authored a book revealing the truth…

    • 192 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Running Head: 1 INTELLIGENCE AGENCIES 1 Intelligent Agencies STS 364 Sadat Cano Arizona State University 3/23/2015 In the U.S national security Umbrella corporations it is composed of many agencies that related to the national security of the United States of America. The U.S national security organizations are composed of many different organizations safe guarding the United of States of American. This organizations serve a purpose to ensure the safety of the United States Citizens and they contribute to the national security of the country. The intelligence is often regard as “intelligence of the enemy”(Troy 1991-92,433), studying the enemy and intelligence organizations collect and analyze data.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Integrity means following person’s moral convictions and doing the right thing in all circumstances, even if no one will realize it. And it is very important if a person is ready to do the right thing even if it can heart and nobody is going to see it. Having integrity means one is true to him/herself and would do nothing that demeans or dishonors him/her.…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I want to write a paper about the NSA(National Security Agency). I chose this agency because my late aunt worked for the NSA until retirement. In any event, the NSA's foundation is on collecting, and monitoring intelligence for the United States. Over they years, the NSA has been delegated more tasks to complete, but all of them theoretically stem from collecting and monitoring information One of the main statues that has been argued to justify the NSA being an entity is the Patriot Act. There are others of statues as well.…

    • 112 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    I am volunteer in Milan centre . I am going for work experience . I am going every Wednesday with my friends .There is disabled people .There is young and old people .And they do art and playing games .we don't need to do anything . We just help them.…

    • 1182 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Covert action is one of many foreign policy tools used by policymakers to advance national interests. Used in select international efforts, covert action encompasses a broad range of activities outside the operations of traditional intelligence collection. Sanctioned by the White House and overseen by Congress, covert action can provide results and otherwise unavailable information. "The term covert action was defined for the first time in statute to mean an activity or activities of the united government to influence political, economic, or military conditions abroad, where it is intended that the role of the united state states will not be apparent or acknowledged publicly".…

    • 1444 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Zillow Case Study Essay

    • 1460 Words
    • 6 Pages

    Introduction In this case study, the business of Zillow.com in providing real estate information to all users to its website is explored, and the use of business intelligence by Zillow.com in its offering to customer, and the way it uses a data mart to market its new product, are discussed. In addition, this case study includes a discussion of various characteristics of information quality as seen from Zillow’s perspective, and how Zillow is using a data-driven website. Analysis Background of Zillow.com Zillow.com is an online web-based real estate site helping homeonwers, buyers to find and share information about real estate and mortgages. It allows users to access information anonoyoumously and free of charge, using the kinds of tools…

    • 1460 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Following the terrorist attacks on September 11th, 2001, many issues were identified within the Intelligence Community (IC), namely that information had not been shared between agencies or with local law enforcement apparatuses in order to piece together the looming threat. In order to fill this significant gap in security and to strengthen U.S. counterterrorism efforts, the Department of Homeland Security (DHS) and the Department of Defense (DoD) created numerous organizations to compensate for the lack of information sharing and implemented various strategies to enhance information sharing capabilities. One of the entities created to solve the lack of information sharing was fusion centers, which debuted across the nation in 2003 to act…

    • 1212 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    You are protected by legislation which are laws provided by the government, this includes duty of care and safeguarding act. You must build up confidence to speak up and contribute because if you are unable to communicate you are more likely to be targeted. This leads to mental health problems and physiological problems such as depression and anxiety and also social isolation. In a health care setting it is best you have a person with you so you have a partner who can support you can provide evidence in a important situation. Confidentiality, being able to keep an individual’s information data well protected from misuse and being spread around the service can help you build trust and relationship with your patient.…

    • 219 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Corruption In The CIA

    • 1258 Words
    • 5 Pages

    The State of War by James Risen was placed during Bush’s (43rd) presidency and the corruption of the CIA. The Soviet Union collapse marked the beginning of corruption in the CIA. The director of the CIA was George Tenet, who was very close to George W. Bush. Tenet was seen by the public as “an honest broker of intelligence”, meanwhile in private he would tell people what they wanted to hear, then go to others and tell them the opposite of it. One of the main reasons that Tenet stayed on as the director of the CIA during George W. Bush’s presidency was due to the fact that Bush (41st) urged his son to keep Tenet.…

    • 1258 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Mercy College defines integrity as, “Moral wholeness, soundness, uprightness, honesty and sincerity as the basis of trustworthiness.” I personally feel that integrity encompasses not only all of these characteristics, but also the ability to apply these characteristics in one’s everyday life. Someone who displays true integrity does not act honestly and sincerely just in easy situations, but also in the most difficult. Integrity is a value everyone should strive to perfect both professionally and personally.…

    • 822 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Importance Of The National Security Agency

    • 1199 Words
    • 5 Pages
    • 1 Works Cited

    There are street cameras everywhere, watching the sidewalks, the cars on the road, and appear at every entrance and exit on public property. We are constantly being observed no matter where go, which isn’t necessarily a bad thing. With the recent terrorists’ attacks and threats, our society should feel protected by the cameras, knowing that if someone attempts to create chaos, it’ll be easier to capture them if they are caught on video. Even though this is form of protection, the government has been over zealous with what exactly they are looking for and taking advantage of the fact that they can watch citizens. The only difference between our government and BB is that people tend to get away with a lot more without causing alarm because our government isn’t as stringent.…

    • 1199 Words
    • 5 Pages
    • 1 Works Cited
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The Importance Of The NSA

    • 1376 Words
    • 6 Pages

    President? The United States was blind-sighted in the September 11, 2001 terrorist attack which resulted in the death of 2,977 innocent Americans. This was the largest attack in the history of the U.S. on our soil and although the signs were there for the intelligence community to see, it was mistakenly not put together. Much of the attack stemmed from communications between terrorist or those connected and working with terrorist within our Country, and this was unacceptable. In order to defend against such communications, according to Lichtblau & Risen (2005), “Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible ‘dirty numbers’ linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications”.…

    • 1376 Words
    • 6 Pages
    Great Essays