CIA Triangle

Improved Essays
What Is the CIA Triangle and Why Is It Important for Cybersecurity Management?
Confidentiality, integrity, and availability, aka the CIA triangle, is a security model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security. Confidentiality
Confidentiality is the security principle that controls access to information. It is designed to prevent sensitive information from being accessed by the wrong people, while ensuring the right people can, in fact, get appropriately managed access to it.

Access must be restricted only to those who are authorized to view the required data. Data can be categorized according to the severity and type
…show more content…
An example of a method used to ensure confidentiality is the use of data encryption. Also, User IDs and passwords constitute a standard procedure, and the addition of two-factor authentication is now becoming the norm for authenticating users to access sensitive data.

Other methods include biometric verification, security tokens, and digital certificates. Users should also take precautions to minimized the number of places where the information appears and sensitive data is transmitted to complete a required transaction.
Integrity
Integrity is the assurance that the sensitive data is trustworthy and accurate. It involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Sensitive data should not be altered in transit, and security measures should be taken to make sure that it cannot be modified by unauthorized users. These measures include file permissions and user access
…show more content…
It is best guaranteed by properly maintaining all hardware and software necessary to ensure the availability of sensitive data. It’s also important to keep current with all necessary system upgrades. Providing adequate communication throughput and preventing the occurrence of bottleneck helps as well. Redundancy, failover, RAID, and clustering are important measures that should be considered to avoid serious availability problems.

A fast and adaptive disaster recovery plan is crucial for the worst-case scenarios, which will depend on the successful execution of a full disaster recovery plan.
Safeguards against data loss or interruptions in connections should consider unpredictable events such as natural disasters and fire. To prevent data loss from occurrences, backup should be located in a geographically separate location, and in a fireproof, waterproof vault.

Extra security equipment or software such as firewalls and proxy servers should be used to prevent downtime due to malicious attacks such as denial-of-service DOS attacks and network

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline. Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    INFO 290: Final Exam

    • 1200 Words
    • 5 Pages

    INFO 290 – Final Exam Name (Print) Cristian David Ramirez-Loaiza Signature______________ Date:____________ Answer any FOUR questions 1. Explain in detail with examples as to why a business needs a disaster recovery plan and Business Continuity plan?…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment? Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Information technology and the long time debate of privacy has evolved and changed continuously through the years to form to the personal need business needs. The concept of privacy and the privacy of data have become a much needed commodity. Privacy can be grouped into two different definitions on being descriptive the other being normative, depending whether they are used to described how individuals perceive a situations and conditions and the way they are value as well as their constraints to the processing of information. The normative sense discusses how the un-absolute moral right of persons control over access to of personal information, personal acquires information about, and technology that can be used to produce information about…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Disaster plans are a very important part of designing a security plan. Disasters come in several types. There are physical disasters like earthquakes, tornados, hurricanes, and floods. Then you have non-physical such as data breaches and system failures. In order for us to complete our security plan we need to create a disaster plan to help us should an unfortunate event occur.…

    • 804 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ease of data management is one of the biggest advantages to any business in the world since the technology boom. A Security breach occurs when hackers illegally gain access to the private and confidential database of companies. It is the intrusion by hackers into the network of a computer or the network of multiple of multiple computers in order to steal or destroy confidential company information. In most cases this information is the personal information of the company’s customers and other users. Personal information such as credit card number, social security number, date of birth, contact information, etc. are stolen or destroyed by hackers.…

    • 1240 Words
    • 5 Pages
    Improved Essays