The CIA Triad

Improved Essays
While most people tend to think of the spy agency when it comes to the CIA, the CIA triad is actually well known amongst those who work with information systems. (Sometimes the triad is actually referenced as the AIC triad so as to avoid confusion with the Central Intelligence Agency) (Brook, 2015). The CIA triad focuses on the characteristics necessary to have secure information.

The first is confidentiality. Confidentiality at its most basic means that information is known only by those for whom it’s intended. When a company neglects confidentiality, a violation of trust ensues. Take for instance, the many companies (from Target to Home Depot) who have disclosed that customer information was stolen from their databases. While that customer
…show more content…
In other words, it has not been modified in any way during transmission or storage. In today’s ever-increasingly-electronic world, information integrity on networks is key. Hackers for instance, could inject malicious code into a program regularly used by a company, shutting down the company and delaying any kind of productivity. Another example that could also be quite damaging to a company would have to do with finances. If a decimal place were moved, or even another 0 were tacked on at the end of an amount, not only would the company’s books be off, but it could prove difficult to reverse as well as trace why there was a deviation from the original amount. Yet another example could pertain directly to data stored in the company’s database. The issue could even be a simple misunderstanding such as an employee who decides to truncate at a certain point. While the difference may seem trivial, there is a difference nonetheless, and could result in differing measurements, estimates, etc. costing the company even more time and money. An easy way to keep the integrity of data intact is to use standard cryptographic hashes such as

Related Documents

  • Improved Essays

    Pt1420 Unit 1 Assignment

    • 970 Words
    • 4 Pages

    Rounding Data When data is gathered and calculated, the final information presented tends to be rounded. On some occasions it may be necessary to round data, especially when rounding non-integer vales to integer values for simplicity and statistical representation. An example of this would be at the end of the calculations in sample weighting, the fractions you get are rounded to integers, since the data is based on physical objects which cannot have fractions, and so is considered extra for rounding purposes. Data may also me rounded in order for it to be understandable if the information is to be presented to other people, or just to keep important digits only to get an idea of scale. Extreme examples of this would be comparing the size of…

    • 970 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Clayton Anderson Ethics in the Profession Midterm The Ethical Case of AshleyMadison.com To begin discussing this case you must know some of the history and information about the website. First off the name Ashley Madison was not a real person it actually comes from the conjunction of two popular female names “Ashley” and “Madison”. The Website has a slogan which is “Life is short. Have an affair.”.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    During the American Revolution, brave soldiers signed up to fight or die for their right to have freedom from the tyrannical grip that England had on America. General George Washington, leader of the Continental Army, led the nation to victory. However, he did not just have help from his army of valiant soldiers. General Washington also had the assistance of completely normal citizens who were appointed to gather information from the British that would be critical to aiding the general. Some of these citizens acted alone in their missions while others were part of groups of fellow spies.…

    • 1951 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Running Head: 1 INTELLIGENCE AGENCIES 1 Intelligent Agencies STS 364 Sadat Cano Arizona State University 3/23/2015 In the U.S national security Umbrella corporations it is composed of many agencies that related to the national security of the United States of America. The U.S national security organizations are composed of many different organizations safe guarding the United of States of American. This organizations serve a purpose to ensure the safety of the United States Citizens and they contribute to the national security of the country. The intelligence is often regard as “intelligence of the enemy”(Troy 1991-92,433), studying the enemy and intelligence organizations collect and analyze data.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    9/11 Core Competencies

    • 372 Words
    • 2 Pages

    Thesis: The 9/11 Commission (2004) discovered flaws with the Intelligence Community concerning information sharing, integrating intelligence, and following through on potential intelligence leads. This led to organizational changes with the establishment of the Director of National Intelligence (DNI), the Department of Homeland Security (DHS), and the National Counterterrorism Center (NCTC). The Intelligence Community consists of 16 organizations, led by the DNI. Each organization works within the DNI’s policy framework. The DNI established IC policy to advance the IC mission objectives to meet national security needs.…

    • 372 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The MS-13 Gangs

    • 1095 Words
    • 5 Pages

    The MS-13 gang, well known as Mara Salvatrucha 13, is one of the most organized and violently dangerous gangs in the United States. The gang was established in the 1980, in the predominately Spanish speaking parts of Los Angeles, initially starting off with refugees who were in nature calm and in control. However, some Mexican immigrants began their power guiding and controlling these individuals into an underworld organization, which quickly began to harden the individuals. Once this occurred in the El Salvadorian neighborhoods, the immigrants wanted to organize themselves, so they decided to come up with a name for themselves.…

    • 1095 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Data integrity is critical to meeting these expectations. A single…

    • 256 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Covert Connections

    • 1927 Words
    • 8 Pages

    Covert connections: The FBN, the OSS, and the CIA. Article Analysis John Zeeman | P.7 Van Nuys | APUSH | 11/17/15 This image, from the cover of Time Magazine in 1987, depicts Oliver North arguing his innocence regarding his involvement in the ‘Iran-Contra Affair.’ (New York Times, 1) Article Summary: The Federal Bureau of Narcotics (FBN) was established in 1930 with Harry J. Anslinger as director.…

    • 1927 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Amir Hakim CHA 3U1. Mrs. Cowling. Independent Study Unit Assignment. June 13 2016 The Cold War was a period of hostility, rivalry and tension between the Soviet Union and the United States of America.…

    • 2243 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The American spies of the Revolutionary War, also known as the Culper Spy Ring, changed the course of history, helped save America and shaped the future of military intelligence as it is known today. In the summer of 1776, the future of America’s colonies was unclear, would America continue to be under British rule or gain independence. The first artillery fire was in Boston, but fear and mistrust were spreading throughout all thirteen colonies. After the continental army defeated the Regulars at Boston, Britain’s commanders needed a new base of operations.…

    • 2062 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays