Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Theory of confidentiality
The nature of confidentiality
The nature of confidentiality
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Theory of confidentiality
CIA triad guide provides an information security model that has three important components to identify gaps and issues as well as corresponding remedies to fill the gaps. The three components that are assessed and evaluated in the information are confidentiality, integrity and availability. Confidentiality refers to information access to the right people or authorized users only. This means that the information or data is secure and has not been compromised to unauthorized users. Major damage to confidentiality would mean that personal unique identifying information would be compromised and accessed by unauthorized users such as cyber criminals and hackers. The types of damage can be anywhere from your Yahoo user ID and password, banking information, SSN, addresses and other personal information when all pieced together can have a lot of financial gain for the cyber hacker. They could take all secure information and to not only disrupt various services for …show more content…
individuals but they can also incite much further 2nd and 3rd order of affects that would lead into compromising the integrity and availability of the secure information. Integrity speaks to the trustworthiness of the data or information resources and refers to the data has not been altered or modified inappropriately by any suspicious activity.
Integrity of information means that the origin or source of the information actually came from the right source. It also means that the information in the database is correct and reflects the actual circumstance. Information going into the system needs to be true, accurate and reliable. Damage to the integrity of the information means, you cannot rely that the company is able to provide reliable and true information. This would mean of face loss, trust, and ability and in some cases like the medical profession could even mean loss of life. If information is compromised or modified, this would be gravely damaging in the medical profession to get the wrong dosage of medication or it could lead to wrong diagnosis. The manufacturing business may lose revenues for having the incorrect numbers for consumer demand versus supply
available. Availability refers to information being accessible and disposable when you need it. You can have all the information in the world but it does not do any good if you cannot access it when you need it which speaks to having a working and capable information system to fit your needs. Damage to availability would could affect anywhere from not being able to access your banking information to disrupting and shutting down major systems and power grids. Because we are so power and energy driven any disruption to these areas can shut down communities to major cities for basic services which all rely on the availability of information. The CIA triad evaluation is essential in assessing the IS architecture structure to identify any weakness that need to be addressed. Each portion should not be addressed in a vacuum but all mutually complementary to building a secure system. Compromise to any area they could take disrupt various services for individuals but also incite much further 2nd and 3rd order of affects that would mean loss of service, personal information, and access to essential information.
This document will outline the policies and practices to be used and implemented in compliance with DoD specifications and standards for the contract of services to be provided to them. This report will consist of creating security controls based on auditing frameworks within the seven domains. Also to develop information assurance (IA) plan, a list of the requirements for each of the seven domains.
The DIA started in 1958. The organizational structure of the DoD and U.S. foreign intelligence came to a new shape with the establishment of DIA. It was Robert McNamara, then Secretary of Defense, who came up with the concept of DIA in 1961. DIA gathers human source intelligence, analyzes technical intelligence, distributes intelligence/reports to the intelligence agencies, provides advice and support to the Joint Chiefs of Staff with foreign military intelligence, and provides military intelligence to combatant commands as its operational functions. A DIA director is supposed to be a three-star military general and DIA is believed to have employed at least 7,500 staff worldwide today. The DIA is a defense intelligence agency that prevents strategic surprises and delivers a decision advantage to warfighters, defense planners, and to policymakers. This paper will try to evaluate DIA’s role in US national security in present condition of massive budget deficits and increased congressional oversight, plus the intelligence capabilities of the Regional Combatant Commanders and the individual services like CIA and NSA.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
I felt that the author had a clear pint throughout this article which was not only to continue the spotlight data breaches which continue to increase within the healthcare field, but also to understand the root cause which is driving the increase in these healthcare data breaches . This was demonstrated throughout the article with a continued focus on health care data breaches and the changes which have been made within healthcare organization to rely more on technology for medical information storage and sharing which the author would relate to how this lead to the each root cause of the increase in data breaches. For the same reason mentioned previously the author was able to successful meet his original purpose for writing the article through his focus on demonstrating the root causes of the data breaches within healthcare organizations and how they will increase over the next five years. The author backed up his arguments by using proven evidence and
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Evaluate the Specifications of Information Security Consultants (vendors) to Become a Strategic Partner Assisting in the Reduction of Information or Security Risks
Veracity refers to the messiness or trustworthiness of the data. There are many forms of big data quality and accuracy that make it very hard to control. An example of this would be hashtags, abbreviations, or typos. Technology now lets us to work with this type of data.
CIA refers to the confidentiality, integrity and availability. The CIA triad is a key concept in security. These three facets of CIA triad are protected as an important step in designing any secure system.
Whitman, M. E., & Mattord, H. J. (2009). Principles of Information Security 3rd Ed. Boston: Course Technology.
There are Different meanings applied to integrity, the most common meaning refer to integrity as consistency (brown 2005:5)
Integrity is needed, when making any decision in my opinion. In my current position in my work, not just we are required by the law to be honest and having and integrity helps a great deal to do my job a great many easier. I work on one on one setting and my clients or customers, having integrity doing the right thing is always the priority event know one’s looking. My customers always expect me to tell them the truth and give them educated advice. Of course, doing the right thing in my business sometimes can cause me to lose a customer. However, in my options I rather loss a customer than compromise my integrity. Once the customer finds out they can trust they tend to help me in my work by referring another customer.
Integrity has been defined as “Moral soundness; honesty; freedom from corrupting influence or motive” by a good friend of mine and college graduate. The dictionary describes it as “Unimpaired, unadulterated, or genuine state; entire correspondence with an original condition; purity.” I enjoy Peter’s definition more then the official definition, however, the “genuine state” part of the dictionary definition is also really good.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
The term integrity has been defined differently by a number of scholars, the proceeding literature is going to cover various aspects pertaining to the definitions put forward by various authors. Issues to be discussed and given depth information on are the validity of integrity tests, reliability and fairness of the tests. On measuring the integrity a number of tests are used to determine the outcome of integrity. Christopher M defined integrity as the state or quality of being entire or complete, wholeness, entireness as the integrity of an empire or territory, he went on to define it as the moral soundness, honest, freedom from corrupting influence. However another scholar Mary C defined I by identifying the balance one’s internal values of integrity and one’s external actions, it the inner self being congruent with the outer self, a kind of balance perhaps it’s like the relationship between the air in the hull of a ship and the water supporting it. Again another scholar gave a definition as something that encompasses both the intellectualization (we call thinking) and the doing, it implies competences and doing things right.