CIA TRIAD.edited.docx - CONFIDENTIALITY INTEGRITY AND AVAILABILITY/CIA TRIAD 1 Confidentiality Integrity and Availability/CIA Triad Students Name


This preview shows page 1 - 4 out of 9 pages.

CONFIDENTIALITY, INTEGRITY AND AVAILABILITY/CIA TRIAD 1 Confidentiality, Integrity and Availability/CIA Triad Students Name Institution Affiliation
Image of page 1
CONFIDENTIALITY, INTEGRITY AND AVAILABILITY/CIA TRIAD 2 Introduction Confidentiality, Integrity, and availability (CIA), also known as the CIA triad, is used by organizations to provide information security. The three elements of the model- availability, integrity, and availability are the most crucial elements of information security. Confidentiality in this model is used to show the access of data is only for authorized users; integrity means the authorized users do the modification of data while availability means the authorized users can access the information when needed (Abawajy, 2014, pp.237-248). Confidentiality Confidentiality is a measure taken to ensure the sensitive information does not get to access to wrong people making sure the right people have the information. Restrictions are put to ensure the data in question is obtained by the authorized only. Data is categorized depending on type and amount of damage if it happens to land in the hands of the wrong people. Measures are put depending on these categories if implementation is to occur. Confidentiality of data is safeguarded through the full training of people who have access to the data. Training involves security risks that may threaten the data. Thus, this helps the people with access to data know the risk factors which they may encounter and how to counter them. Strong passwords help to prevent unauthorized people from accessing the data. Confidentiality ensures that data is safe from access by unauthorized users who may interrupt the data leading to data loss. If data is kept secure from attackers, it guarantees the originality of the stored information. Integrity Process of maintaining the accuracy, trustworthiness, and consistency of data in a given organization. Special measures should be taken to make sure that unauthorized people do not alter data. Such measures include permission to files and right control measures. To access a given file, one has to be granted permission to access it to ensure data integrity. Unauthorized users might delete data leading to the omission of valuable data. Some measures should be put in place to detect any changes in data since this may occur naturally. Backup is also essential to restore the lost data to its original state in case of any abnormality occurrence on stored data. Integrity ensures stored data is confidential only to the authorized users.
Image of page 2
CONFIDENTIALITY, INTEGRITY AND AVAILABILITY/CIA TRIAD 3 Availability Availability ensures that data is available by the time is needed by the authorized users. Availability is best achieved by making sure the hardware is well maintained, maintaining functional operating system platforms free of system conflicts. The system should also be upgraded regularly. Data should always be safeguarded to prevent loss or interruptions hence ensuring its availability when needed. In avoiding data loss, a backup copy of the data should be
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 9 pages?

  • Spring '15
  • James

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors