Explain The Goals Of Confidentiality

Superior Essays
Assignment 1

Explain the goals of Confidentiality, Integrity, and Availability with respect to Systems Security.
Confidentiality, Integrity and Availability are also known as the CIA triad. This triad is used a as guide for computer and information security in many organizations. Confidentiality is privacy. (Rouse, 1999) Its role in the triad is to make sure items that are supposed to private stay that way. But it doesn’t keep those items from those that are supposed to have them. Information access is restricted and categorized by the damage it could cause. (Rouse, 1999) But the CIA triad are not just for information security. It can also used for recovery. There are other areas in business such as quality assurance or regulatory
…show more content…
(DHS, n.d.) Protection helps with being able to limit the potential impact of a hack. (DHS, n.d.). Protection of information services information involves various “activities”. Access Control is one such activity. In access control a user can only get to, access, the information he/she is entitled to. Also the any access control method used should be in line with the classification of the data it protects. Meaning that that more sensitive the data is, the tougher the systems or software used to protect that data should be. (Wikipedia, 2017) Training is another activity of Protection. Organizations should implement some sort of training schedule in cybersecurity to keep it employees up to date on the current trends in cybersecurity. They should also be trained in what to look for encase the system has been compromised so they can be a part of minimizing the threat. (Wikipedia, 2017) It would also be a clever idea for any partners the organization must be involved in security training as well. And of course, any training provided by the organization should be aligned with any policies, procedures, and agreements the organization has created. A third aspect of protection is data security. Data Security means that the confidentiality, integrity, and availability of information on the organizations systems must be protected. (Wikipedia, 2017) The …show more content…
Cybersecurity Framework. Retrieved September 16, 2017, from https://www.us-cert.gov/ccubedvp/cybersecurity-framework

Lord, N. (2017, March 21). What is Data Governance? Data Protection 101. Retrieved September 16, 2017, from https://digitalguardian.com/blog/what-data-governance-data-protection-101

Wikipedia. (2017, September 15). NIST Cybersecurity Framework. Retrieved September 16, 2017, from https://en.wikipedia.org/wiki/NIST_Cybersecurity_Framework

Indika. (2011, July 02). Difference Between Network Security and Information Security. Retrieved September 18, 2017, from http://www.differencebetween.com/difference-between-network-security-and-vs-information-security/

Secureworks. (2017, March 17). Cybersecurity vs. Network Security vs. Information Security. Retrieved September 18, 2017, from https://www.secureworks.com/blog/cybersecurity-vs-network-security-vs-information-security

Valparaiso University. (2014, September 11). Cyber Security Vs. Information Security | MS Cyber Security. Retrieved September 18, 2017, from

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Criteria should be developed on who has access to what information, and appropriate technical safeguards should be put into place, so information is only…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    1. In your text book, the 911 Commission Report suggested several reforms for restructuring government in the wake of 911 and has listed ten (10) recommendations. In this Question, you are to discuss each of the recommendations and were the recommendation’s successful or not. Do we need to make changes here and where to expand on these recommendations?…

    • 2031 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    I am volunteer in Milan centre . I am going for work experience . I am going every Wednesday with my friends .There is disabled people .There is young and old people .And they do art and playing games .we don't need to do anything . We just help them.…

    • 1182 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Cyberattacks have become one of the biggest threats facing the United States today. Although Bill Clinton, George Bush, and President Obama have passed laws and put forward executive orders; cybercrime is still a prominent threat to our country. Obama further extended Bush’s Patriot Act through executive orders, improving the security to sixteen sectors by providing more in order to prevent future breaches and threats. Cybersecurity has become a prominent issue in politics and how our government reacts to cyber threats. The stakeholders from a political lens focus on how cybersecurity affects our government.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Information security is an extremely important concept so when protecting information in an organisation there is three core principles to follow to maintain the utilization, flow and storage of data this is also known as the CIA triad these are the three main objectives of information security and they are:…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays