Question

In: Computer Science

The CIA triad is widely referenced in today's information security environments as a basic model for...

The CIA triad is widely referenced in today's information security environments as a basic model for information security. There are three distinct legs to the CIA triad: confidentiality, integrity, and availability. Select one of the CIA components and expand on it. Include a baseline review of that specific attribute as well as challenges that might be encountered, including two potential security issues.

Respond to the following in a minimum of 175 words:

Solutions

Expert Solution

CIA Triad's Confidentiality:-

Confidentiality guarantees that touchy data are gotten to just by an approved individual and avoided those not approved to have them. It is executed utilizing security systems, for example, usernames, passwords, get to control records (ACLs), and encryption. It is likewise regular for data to be classified by the degree of harm that should be possible should it fall into unintended hands. Safety efforts would then be able to be executed as needs be.

Data has esteem, particularly in this day and age. Financial balance explanations, individual data, charge card numbers, exchange privileged insights, government records. Each one has data they wish to stay discreet. Ensuring such data is a noteworthy piece of data security.

An extremely key part of securing data confidentiality would be encryption. Encryption guarantees that lone the correct (individuals who knows the key) can peruse the data. Encryption is VERY boundless in the present condition and can be found in pretty much every real convention being used. An exceptionally noticeable model will be SSL/TLS, a security convention for interchanges over the web that has been utilized related to an enormous number of web conventions to guarantee security.

Different approaches to guarantee data confidentiality incorporate implementing record consents and access control rundown to confine access to touchy data.

Two-factor validation is presently turning into the standard for verifying clients to get to delicate information, while client IDs and passwords ought to be viewed as standard practice.

Different strategies incorporate biometric check, security tokens, and advanced endorsements. Clients ought to likewise be careful to diminish the quantity of spots where the data shows up and where delicate information is transmitted so as to finish an exchange.

Security Vulnerabilities:-

Breaking encoded information

Man-in-the-center assaults on plaintext information which is proposed to be private

A worker putting delicate information on removable media, for example, SD cards or optical circles and offering it to unapproved parties

Introducing spyware malware on an information server which has private data, so as to transmit its information to assailants

Doxxing, which is releasing private data, (for example, standardized savings numbers or telephone numbers) about an individual or association so as to do hurt


Related Solutions

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...
What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?
Why might the traditional model of Health Information Management practice roles not be appropriate for today's...
Why might the traditional model of Health Information Management practice roles not be appropriate for today's healthcare environment?
Why might the traditional model of Health Information Management practice roles not be appropriate for today's...
Why might the traditional model of Health Information Management practice roles not be appropriate for today's healthcare environment?
Cost-volume-profit [CVP] analysis is a widely used, basic business model. Discuss the underlying assumptions made in...
Cost-volume-profit [CVP] analysis is a widely used, basic business model. Discuss the underlying assumptions made in the application of the model and whether these limits the usefulness of the model. Would you rely on the model? Write about 150 words.
Cost-volume-profit [CVP] analysis is a widely used, basic business model. Discuss the underlying assumptions made in...
Cost-volume-profit [CVP] analysis is a widely used, basic business model. Discuss the underlying assumptions made in the application of the model and whether this limits the usefulness of the model. Would you rely on the model? Why or why not?
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome this policy development and implementation issues.
Describe the basic elements of human nature and how they affect information security policy development and...
Describe the basic elements of human nature and how they affect information security policy development and impact information security policy implementation issues. Propose at least three ways that organizations can overcome these policy development and implementation issues.
Explain two fundamental concepts; why information security is a management issue, and the time-based model of...
Explain two fundamental concepts; why information security is a management issue, and the time-based model of information security.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT