Question

In: Computer Science

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?

Solutions

Expert Solution

The CIA is a security and privacy based model brought to favour organisation as they now mostly rely on computer systems for various sensitive stuffs such as security, authorization etc to other aspects such as research from data or marketing activities etc. Meanwhile as the data involves computer system, it is necessary to impose security and privacy constraint over the data so that it can't be exploited.

Goals of Confidentiality in CIA --

-- Provides encryption services on the data and network which ensures the data is not available in raw form in rest or in-transit situation.

-- Confidentiality ensures sensitive information of organization is kept private and authorized limited data is available for access only by authorized individuals.

-- Organisation collective database can be kept secretive from the competitors.

Goals of Integrity in CIA --

-- It ensures the data, system and network is consistent over any instance.

-- It ensures to retrieve the lost data , also provides integrity to data in-transit which means data on the sender and receiver side are same and exact data without any alteration.

-- It makes sure that no amount of data is unprotected from unauthorized sources and data have to be accurate.

  Goals of Availability in CIA --

-- It ensures system, data or network is available anytime it is requested for access, to authorized users.

-- It ensures reliability of network, system and data that is accessed.

In today's era as the organisations, be it a IT or non - IT firm, is moving into computer system for maintaining all its business transaction or keeping track of operational activities, As the data held in system by the organization is vulnerable and essential for the business, it is an important task to make sure the data and the complete system of organisation is kept secure and private along with high security standards, Here, comes CIA to ensure all the above factors are implied.


Related Solutions

QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a...
QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a threat. most common types of security controls. assurances that requested information is available to authorized users upon request. tenets of information security. 1 points    QUESTION 2 What name is given to the assurance that requested information is available to authorized users upon request? Detective control Availability Confidentiality Integrity 1 points    QUESTION 3 Which of the following refers to the assurance that information...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that information has not be altered in an unauthorized way Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so AAA Assurance - How trust is provided and managed in computer systems Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine. Anonymity - The property that...
Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and...
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and understand why two more attributes, Authentication and Nonrepudiation, should be involved in the Security Services dimension, and what the Time dimension for information security and assurance discusses. Write a short paper to discuss and describe your understanding.
The CIA triad is widely referenced in today's information security environments as a basic model for...
The CIA triad is widely referenced in today's information security environments as a basic model for information security. There are three distinct legs to the CIA triad: confidentiality, integrity, and availability. Select one of the CIA components and expand on it. Include a baseline review of that specific attribute as well as challenges that might be encountered, including two potential security issues. Respond to the following in a minimum of 175 words:
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective,...
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective, which item will be difficult to enforce? (b) One of the realities of the modern Internet is that new network vulnerabilities will be discovered almost daily. You can also count on those vulnerabilities being exploited soon after they are found. An entire industry is growing and profiting from these discoveries, whether they are used maliciously or used to lead to the prevention of future...
1. What is the Dark Triad? What are the three traits in the Dark Triad personality...
1. What is the Dark Triad? What are the three traits in the Dark Triad personality structure? Explain each trait – do not simply list them. Give an example of each trait (how would we observe each trait behaviorally?).
Which of the following security objectives supports non-repudiation Group of answer choices confidentiality integrity accountability authenticity
Which of the following security objectives supports non-repudiation Group of answer choices confidentiality integrity accountability authenticity
What are the main goals of Monetary policy?
What are the main goals of Monetary policy?
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT