Question

In: Computer Science

Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and...

  • Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and understand why two more attributes, Authentication and Nonrepudiation, should be involved in the Security Services dimension, and what the Time dimension for information security and assurance discusses.
  • Write a short paper to discuss and describe your understanding.

Solutions

Expert Solution

Ans: - Cybersecurity protects the computer system and other devices from different cyber-attacks. On internet the cyber-attacks are being increased day by day. So, the security of the online inter-connected system is the major concern. There are three main attributes that are related to the cybersecurity that Integrity, confidential and Availability.

Integrity: - Integrity in terms of security means that the data should remain accurate, consistent and uninterrupted. The system should be made as secure as no unauthorized user cannot make any alterations in the data. Getting unauthorized access by any attacker can leak whole data and records. So, the integrity focus on keeping data secure from unauthorized users.

Confidentiality: - Confidentiality refers to privacy of the data. The data in any organization or industry should kept confidential and should be only accessible to the authorized users to prevent data from unauthorized access. Data should be accessible for the different workers in the organisation according to their requirement. For example, the database administrator has access to all the data of the database and he can make alterations in data. But other employees can see only that part of data which is required to them.

Availability: - The availability is also an important factor of security. Availability means that the information must be available for the authorized user. System must be made available to the user and it should function properly. Login credentials are used to make the availability of the system possible. So that only authorized users can access the system resources.

But achieving these three factors of information security does not ensure the complete security. There are several more dimensions of the security that need to be implemented. The employees of the organization should be trustworthy because they know about the infrastructure and working environment of the organization. But they can be threat to the organization because these employees can leak the confidential information to other parties which can cause a negative impact on the growth of any organization. So, the employees and other members of the company should follow the security policies of the company.

The information assurance is the model for protecting the computer system and information technology. It includes five factors which are confidentiality, availability, integrity, authentication and non-repudiation. By ensuring all these factors in the security mechanism it protects the information.

It includes authentication and non-repudiation which are required to make data secure and accurate.

Authentication: - Authentication is the method to identify and verify the users. Authentication includes the password, login credentials, biometric and other techniques for the validation of the users. This is essential in any organization protect the information.

Non-repudiation: - It is the important factor in the information assurance model. If any user has accessed the system and perform some actions on it then he can deny or disagree that he hasn’t done it. It means there is record of the communication or meeting that held between any party and organization so that party cannot deny that conversation.

So, the above two factors are also important and that why they are involved in the Security Services dimensions. As identifying and validation the users is important and any user who has accessed the system resources, he can’t deny from it because his log session has been recorded by the system.

The time dimension is the main module of information security and assurance as it defines the rules and parameters by which the information is made available to user in online node or offline mode. It defines the time constraint which at what time the information will be accessible to the users of the system.

The people dimension means to identify the people who are legitimate users and who are threat to the information. Users should follow all the policies and rules to create a well-established environment in an organization.,


Related Solutions

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...
What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?
QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a...
QUESTION 1 The C-I-A Triad (confidentiality, availability, and integrity) make up the three: exposures to a threat. most common types of security controls. assurances that requested information is available to authorized users upon request. tenets of information security. 1 points    QUESTION 2 What name is given to the assurance that requested information is available to authorized users upon request? Detective control Availability Confidentiality Integrity 1 points    QUESTION 3 Which of the following refers to the assurance that information...
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective,...
If we have centralized control of access in an organization, from C-I-A (Confidentiality, integrity, availability) perspective, which item will be difficult to enforce? (b) One of the realities of the modern Internet is that new network vulnerabilities will be discovered almost daily. You can also count on those vulnerabilities being exploited soon after they are found. An entire industry is growing and profiting from these discoveries, whether they are used maliciously or used to lead to the prevention of future...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that information has not be altered in an unauthorized way Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so AAA Assurance - How trust is provided and managed in computer systems Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine. Anonymity - The property that...
Integrity vs. Availability" In the global enterprise, firms are insistent that their accounting information systems (AIS)...
Integrity vs. Availability" In the global enterprise, firms are insistent that their accounting information systems (AIS) and other key systems are available 100% of the time, and that these systems are the highest in integrity. Evaluate how a firm manages the balance of high availability with high integrity in these days of tight budgets and additional oversight from regulators. As a student taking online classes or relying on online resources such as libraries and tech support, evaluate the benefits of...
Review the following article on correlation. What one new piece of information did you learn from...
Review the following article on correlation. What one new piece of information did you learn from this article? Explain it in everyday language – in the same way that you might explain it to a client. Create an example to help in your explanation.
How should you deal with confidential information? Provide three examples of breaches of confidentiality. (120–150 words)
How should you deal with confidential information? Provide three examples of breaches of confidentiality. (120–150 words)
In Thinking, Fast and Slow, you learn about several biases including the (1) availability bias, (2)...
In Thinking, Fast and Slow, you learn about several biases including the (1) availability bias, (2) anchoring effect, (3) hindsight bias, and (4) focusing illusion. a. For each of these biases, discuss (one at a time) how each could affect your decision making as a manager or employee (choose the role - manager or employee - you feel is more appropriate for the discussion). b. How can being aware of these biases help you in your role as a manager...
Describe what you have learned in the course and what you are looking forward to learn...
Describe what you have learned in the course and what you are looking forward to learn in the future within the program?The program i pick is Allied health mananagement. Elements of assignment: 1-2 Pages (NOT including the cover or reference page) 12 Font, Times New Roman Double Spaced APA format Well-thought out commentary
Review the Compliance Assurance Process article, and comment on whether you think this would be beneficial...
Review the Compliance Assurance Process article, and comment on whether you think this would be beneficial for the taxpayer. Discuss how the IRS could monetize this process in order to show that it is a valuable program
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT