Describe The C. I. A. Triangle

Improved Essays
Describe the C.I.A. triangle, which is founded on three desirable information characteristics: confidentiality, integrity, and availability.
Page 7

To understand InfoSec one has to know how the C.I.A. triangle plays a part in it, the features are confidentiality, integrity, and availability, while looking at security technology it would seem like these three components are insufficient as a single part due to their limits in the ever changing IT environment their scopes are limited the needs in the IT field requires a more robust design. The development of the C.I.A. triangle is now a list of wide-range features and procedures that are vital, which covers privacy, identification authentication authorization, and accountability. The three discussed in this paper will be availability, confidentiality, and integrity (Whitman & Mattord, 2014).

As the management of information security becomes vital and the circumstances are that there is no way to simply view information security, individuals must know how to handle the different issues when it comes to information security. The compromises that could pose a threat to government and enterprises can come from natural disasters, technical possibilities and human-associated risk rather intentionally or not. Ensuring that this data is safeguarded consist of maintaining the
…show more content…
triangle is positioned on layer one of the TISA trusted layers, the confidentiality

(de Oliveira Albuquerque, García Villalba, Sandoval Orozco, Buiati, & Tai-Hoon, 2014).

References

Whitman, M. E., & Mattord, H. J. (2014). Management of information security (4th ed.). Boston, MA: Cengage.

de Oliveira Albuquerque, R., García Villalba, L. J., Sandoval Orozco, A. L., Buiati, F., & Tai-Hoon, K. (2014). A Layered Trust Information Security Architecture. Sensors (14248220), 14(12), 22754-22772. doi:10.3390/s141222754

Katzenstein, W., Martin, T., & Vrable, M. (2004). Making the CIA Work for You. UMAP Journal, 25(2),

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark continues to develop and innovate. The company holds several patents the most valuable being the first issued in 2002 for the “Network Vaults” (US6356941, 2002) providing a very narrow single channel to securely store, and exchange information. Other Patents include technology for Monitoring session traffic, Doing Correlation analysis for risk assessment, unauthorized target analysis to detect access breaches, and a system to protect publication of sensitive documents within an…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The NSA/CSS strives to lead an expert workforce for their best efforts to advance and operate cryptologic systems and tools. They also look to improve performance and integration of their core expertise and of their mission to protect and defend. The agency must also make sense of and securely share electronically gathered information as well as increase security of national security systems. To accomplish these goals, a five-step strategy has been set in place. First, the NSA/CSS must succeed in todays operations by enabling wise…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    CIA Triad, Confidentiality, Integrity and Availability is a standard for information security. Confidentiality seeks to prevent the unauthorized disclosure of the information. Data is accessible to users who have formal access approvals, security clearances and on need to know basis. In nutshell, Confidentiality prevents read access to data and you need to have permissions or authority to do so.…

    • 104 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    The CIA provides the clients with assurance of security services and guides policies for information security within an organization. When these three are compromised it results in reason consequences and it is punishable under the United States Justice Law. When there is loss of data, the availability of guaranteed reliable access to information by authorized people is nonexistent. Moreover, the integrity of the information whether it’s trustworthy or accurate after such intrusion requires verification and costs money to run certain forensic testing. Hence, when CIA is compromised such intruder must be punish severely for thousands of highly sensitive data is under…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    The Information Assurance mission confronts the challenge of preventing foreign enemies from gaining access to sensitive: national security information. The Signals Intelligence mission collects, processes, and disseminates intelligence information for intelligence and counterintelligence purposes and to support military operations. The overall mission of the NSA and the CSS “leads the U.S. Government in cryptology that encompasses both Signals Intelligence and Information Assurance products and services, and enables Computer Network Operations in order to gain a decision…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    In spite of the fact that the Homeland Security’s main priority is to protect the civilians of the U.S, many worry that the funding is not necessarily used in the correct manner. It is understood that some believe that the expenditure is used to frequently obtain information on citizens and many feel this is a breach of privacy rights. Opposing parties believe that homeland security strategies can, and do, break regulations centred on human privacy rights. According to Kevin M. Keenan, eight states financially supported by the U.S. Department of Homeland Security began experimenting the total information Multistate Anti-terrorism Exchange, also known as MATRIX.…

    • 1090 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    INTRODUCTION The increasing growth of cybercrime and the associated risks are forcing most organizations to focus more attention on information security. It is critical that organizations must find a way to protect their data. This article will describe how to plan, develop and create an Information Security Operation Center (ISOC). Basically, an ISOC brings together the many isolated monitoring and response functions in a unified framework.…

    • 1078 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays