The CIA Triad, writing homework help

User Generated

Wblrf

Writing

Description

You have been asked by upper management to prepare a paper on information security specifically related to confidentiality, integrity, and availability (CIA), along with trusted computing.

Your paper should demonstrate that you are able to understand and apply these common information security concepts and must include an analysis that addresses the breadth and coverage of information security regarding:

1.People

2.Processes, and

3.Technologies.

Submit a three- to five-page paper that meets the requirements above. Your well-written response should be formatted according to APA Requirements, with all sources properly cited.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Thank you for working with me, in case of anything else kindly inform me i am at your service for anything you need

Running Head: Information Security

Information Security
Student
Institution
Course:
Tutor:

Information Security

2

Trends
Confidentiality, integrity, and availability are the main principles of information security.
They form the CIA triad. To vividly comprehend these aspects in information security, it is
crucial to first understand the current trends within the global IT sectors as well as the breach
trends. According to the recent Global Internet Report (Society, 2016), there are just over 3.2
billion internet users around the globe. This marks a steady growth in internet usage in most
nations, mainly because of the propelled ideology that we are living in a digital era with
uncountable technological advancements. According to the findings in the Global Internet
Report, Europe has the highest number of individuals using the internet with 76% while Africa is
last with approximately 20%. Insecurity issues trail the high usage of internet. The Internet and
other technological advancements have established a virtual environment that is characterized by
many anonymous users. Offenders can now hide behind the virtual environments. Predictably,
cyber crime has been on a quick gradual rise as more people adopt various technologies.
According to the Gemalto Breach Level Index, there were approximately 1,673 established
breach cases and an estimated 707 million of records which were exposed to possible breaching
(Society, 2016). This is an alarming trend taking into account the fact that about 47% of
breaching reports in the same year was not reported (Society, 2016). Thus, we could be perturbed
by a high figure representing the various security challenges most people and companies in the
world are facing.
Confidentiality
What is the role of CIA triad in such cases, particularly in reference to information
security? First, confidentiality as a principle guarantees safeguards of any component from any
illegal and unapproved access within an individual’s or company’s information system. This

Information Security

3

includes the protection of each and every element from the storage processes to the
communication channels. A straightforward and practical example is that of a transaction using a
credit card. The necessary steps in the whole process would be the presence of internet services
to transmit the number of the number of the card from the source to the trader and consequently
from the operator to the network that processes the transaction. In such a case, the information
system is structured to put into effect confidentiality probably by encrypting the number of the
credit card when transmitting as well as limiting any access to further information. However, if
any other unauthorized individual acquires the card number, no matter the means, then we can
consider that particular case as a confidentiality breach. Away from the virtual setting, privacy
breach can also occur when an unauthorized individual looks at a computer displaying
confidential information. There are also situations whereby a computer containing workers or
clients’ sensitive data is stolen, and this results in a confidentiality breach.

Confidentiality

Possible Threats

Counter Measures

Focus



Loss of data o...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags