Question

In: Computer Science

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?

Solutions

Expert Solution

The CIA is a security and privacy based model brought to favour organisation as they now mostly rely on computer systems for various sensitive stuffs such as security, authorization etc to other aspects such as research from data or marketing activities etc. Meanwhile as the data involves computer system, it is necessary to impose security and privacy constraint over the data so that it can't be exploited.

Goals of Confidentiality in CIA --

-- Provides encryption services on the data and network which ensures the data is not available in raw form in rest or in-transit situation.

-- Confidentiality ensures sensitive information of organization is kept private and authorized limited data is available for access only by authorized individuals.

-- Organisation collective database can be kept secretive from the competitors.

Goals of Integrity in CIA --

-- It ensures the data, system and network is consistent over any instance.

-- It ensures to retrieve the lost data , also provides integrity to data in-transit which means data on the sender and receiver side are same and exact data without any alteration.

-- It makes sure that no amount of data is unprotected from unauthorized sources and data have to be accurate.

  Goals of Availability in CIA --

-- It ensures system, data or network is available anytime it is requested for access, to authorized users.

-- It ensures reliability of network, system and data that is accessed.

In today's era as the organisations, be it a IT or non - IT firm, is moving into computer system for maintaining all its business transaction or keeping track of operational activities, As the data held in system by the organization is vulnerable and essential for the business, it is an important task to make sure the data and the complete system of organisation is kept secure and private along with high security standards, Here, comes CIA to ensure all the above factors are implied.


Related Solutions

QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a...
QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a threat. most common types of security controls. assurances that requested information is available to authorized users upon request. tenets of information security. 1 points    QUESTION 2 What name is given to the assurance that requested information is available to authorized users upon request? Detective control Availability Confidentiality Integrity 1 points    QUESTION 3 Which of the following refers to the assurance that information...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that information has not be altered in an unauthorized way Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so AAA Assurance - How trust is provided and managed in computer systems Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine. Anonymity - The property that...
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and...
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and understand why two more attributes, Authentication and Nonrepudiation, should be involved in the Security Services dimension, and what the Time dimension for information security and assurance discusses. Write a short paper to discuss and describe your understanding.
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective,...
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective, which item will be difficult to enforce? (b) One of the realities of the modern Internet is that new network vulnerabilities will be discovered almost daily. You can also count on those vulnerabilities being exploited soon after they are found. An entire industry is growing and profiting from these discoveries, whether they are used maliciously or used to lead to the prevention of future...
1. What is the Dark Triad? What are the three traits in the Dark Triad personality...
1. What is the Dark Triad? What are the three traits in the Dark Triad personality structure? Explain each trait – do not simply list them. Give an example of each trait (how would we observe each trait behaviorally?).
Which of the following security objectives supports non-repudiation Group of answer choices confidentiality integrity accountability authenticity
Which of the following security objectives supports non-repudiation Group of answer choices confidentiality integrity accountability authenticity
What are the main goals of Monetary policy?
What are the main goals of Monetary policy?
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
What are the main goals of the FOMC? How do they try to achieve those goals?...
What are the main goals of the FOMC? How do they try to achieve those goals? What are open market operations? How do Fed actions effect consumers actions?
List the three main goals of a project. Use an example of a project to implement...
List the three main goals of a project. Use an example of a project to implement a new billing procedure for a small lawn mowing business, describe how project management principles help achieve these goals.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT