CIA traid confidentiality, integrity and availability.

User Generated

fulnz3591

Computer Science

Description

Discuss CIA triad, confidentiality, integrity and availability. Discuss how each element can be achieved in secure software development.

Your research paper should be in APA format with the following format:

1. Chapter one, introduction.

2. Chapter two, review of literature.

3. Chapter three, define the research problem, methodologies, and analysis.

4. Chapter four, the research contribution to solving the problem, and recommendations {atleast three pages}.

5. Chapter five, conclusions and future work.

6. References

Paper should be between 15 - 20 pages

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello ,check the paper, its fine as per the instructions you sent.preview and in case of a comment informthank you for your time

Running head: CIA TRIAD RESEARCH PAPER

1

CIA TRAID CONFIDENTIALITY, INTEGRITY AND AVAILABILITY RESEARCH PAPER
Student’s Name
Course Title
June 23, 2018

CIA TRIAD RESEARCH PAPER

2

Table of Contents
Chapter one: ................................................................................................................................................. 3
Introduction. .............................................................................................................................................. 3
Chapter Two:................................................................................................................................................. 4
Literature Review...................................................................................................................................... 4
Chapter Three: .............................................................................................................................................. 6
Research problem definition, methodologies, and analysis. ..................................................................... 6
Confidentiality: ..................................................................................................................................... 6
Integrity: ................................................................................................................................................ 7
Availability: .......................................................................................................................................... 7
Challenges with the CIA triad:.................................................................................................................. 8
Methodologies and Latest Trends in CIA security ................................................................................... 9
CIA and PANs. ..................................................................................................................................... 9
The Last Mile. ..................................................................................................................................... 10
Wireless Advantages ........................................................................................................................... 10
Chapter Four: .............................................................................................................................................. 12
Contribution and problem-solving techniques and recommendations .................................................... 12
Security recommendations ...................................................................................................................... 12
CIA Physical security measures.............................................................................................................. 13
The technical approach to CIA security .................................................................................................. 14
The public Key Encryption method ........................................................................................................ 14
The password policy ............................................................................................................................... 15
Chapter Five: ............................................................................................................................................... 16
Conclusions and future work. ................................................................................................................. 16
Chapter Six: ................................................................................................................................................. 18
References ............................................................................................................................................... 18

3

CIA TRIAD RESEARCH PAPER

Chapter one:
Introduction.
Security infrastructure revolves around the systems linking together to curb the external and
internal risk of malicious intentions. The security of networks is of paramount consideration
especially when it involves institutions such as government agencies and huge corporations. CIA
infrastructure is used to safeguard data transmitted through networks. The three CIA triad which
is Confidentiality, integrity, and availability, refers to a model tailored to provide a framework
for policies guiding information security in an organization. This model is at times called the
AIC triad to rid confusion with CIA agency of Intelligence. These three elements are considered
the most crucial components when security is concerned. Since the public demand has expanded
more than the agency’s ability to provide adequate security in the network infrastructure, there is
need to come up with CIA security measures. The internet is not a safe place for everyone. It is
comprised of good people and bad people. Bad people seek to use small vulnerabilities that we
ignore to exploit our information without our consent. With the alarming cases and sophisticated
security attacks, paramount attention is needed to safeguard sensitive and personal data, as well
protect national security. Therefore, we shoul...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags