CIA Triad? Sounds like a secret organization doesn’t it? It almost feels like people are going to come to a screeching halt in your driveway, jump out and take you away, never to be seen again. Sounds very scary. Good thing for us that is not going to happen. Lets get to the point. Information is defined as raw data, which includes words, numbers, value etc. It includes analytical and Factual information. Security is defined as the prevention of intentional harm. The CIA Triad is structure of policies relating to solving problems dealing with information security. Julius Caesar was the first to create something that could be considered as information security. He invented the Caesar cipher. Unless you were meant to see his messages, it was totally undecipherable. There are two categories within information systems: IT security and information assurance. IT security is mainly for any device that uses a processor; the system protects it from any malicious attacks such as cyber attacks. Information Assurance is making sure that if there is a problem that all data gets backed up and does not suffer harm after an attack. Over the years the government, employers etc. have gotten large amounts of information on people around the world and now since we are in a technological age all of that information is stored on computers and shared through out a network. Now imagine if that information were to get into the wrong hands, it would be a major catastrophe. As a user of electronic devices, we want to be sure we protect our privacy too. If we have our financial information on our devices, we want to be sure that it’s safe and will not be used to ruin us financially. This is the CIA Triad comes into play. The CIA defends information from unau...
... middle of paper ...
...r every possibility. One goes through each pro and con. The grid is divided in a 2x2 template with four templates with each of the SWOT acronyms as headers.
Strengths Weaknesses
No unauthorized access hacking
Allow access to those who need it
Opportunities Threats
Allow access to those who need hacking
it and allow people to choose who phishing
can access it
Our Information systems seem to be safe for now and hopefully we can keep it as it is, with a little more improvement.
Work Cited
Cryptography 101 with SSL. InfoSec Institute. 2013. http://resources.infosecinstitute.com/cryptography-101-with-ssl/
Gibson, Darril. Understanding The Security Triad (Confidentiality, Integrity, and Availability). Pearson IT Certification. 2011. http://www.pearsonitcertification.com/articles/article.aspx?p=1708668
In the Supreme Court case of the New York Times Co. vs. United States there is a power struggle. This struggle includes the entities of the individual freedoms against the interests of federal government. It is well known that the first amendment protects the freedom of speech, but to what extent does this freedom exist. There have been instances in which speech has been limited; Schenck vs. United States(1919) was the landmark case which instituted such limitations due to circumstances of “clear and present danger”. Many have noted that the press serves as an overseer which both apprehends and guides national agenda. However, if the federal government possessed the ability to censor the press would the government restrain itself? In the case of the Pentagon Papers the necessities of individual freedoms supersedes the scope of the national government.
On July 6, 2005, a federal judge ordered Judith Miller, journalist for the The New York Times, to jail. Miller was involved in the exposure of Valerie Plume as a CIA operative. In questioning, Miller invoked reporter’s privilege by refusing to disclose the identity of her sources, fueling fire to a heavily debated ethical issue in the field of journalism (Pinguelo, “A Reporter’s Confidential Source…Revealed?”). Successful journalism tells the truth to a public who has the right to know it. Journalists have the responsibility to tell us a story laden with facts and the more important responsibility of revealing the source of their information, right? Not necessarily. The right of journalists to keep their sources private has been a long-standing debate. The ethics in this debate are blurry. On one hand, it may be extremely important to the issue at hand that the source of information be known, as an argument could lose credibility otherwise. On the other hand, the source has the right as an American and an individual to remain anonymous. Isn’t it enough that he or she came forward with information at all? Judith Miller’s case garnered public attention and is just one example of many instances that raise the same, consistently debated question- how far can journalists go in protecting their sources and under what circumstances does withholding the identity of a source become unethical for either party involved? The answer to this question is obscure, but solvable. Journalists should have the right to protect to identity of a source unless the information they possess is for the greater good of the public or the situation at hand.
‘The wink and the nod’ that was all somehow acceptable to your primary sponsor caused many a dictator to adopt these methods to take and maintain power. Only recently have internal CIA documents become available, allowing researchers to begin to look inside the CIA itself. Partial as these releases are, they supply valuable insight into the machinations of this secretive organization. These documents outline the beginning of the Terror; let's hope we are seeing the end of it.
Prados, John. Safe for Democracy The Secret Wars of the CIA. Chicago, IL: Ivan R Dee, Publisher, 2006.
“President Bush has stated that about a hundred detainees were held under the Central Intelligence Agency secret detention program, about a third of whom were questioned using “enhanced interrogation techniques. The CIA has a way of very publicly blowing their cover seeming to pop up wherever turmoil, and political problems arise. The CIA exists to prevent threats, its operations involve covert actions or spying through various means to gather critical intelligence data. The CIA dates back to 1947. The qualifications and skills are above average. The job of the CIA is to anticipate and quickly assess rapidly evolving international developments and their impact, both positive and negative, on US policy concerns. When researching the career of
Weiner, Tim. Legacy of Ashes: The History of the CIA. New York: Doubleday, 2007. Print.
knowledge of the CIA and who would later would be involved in the clash between the
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
The Central Intelligence Agency is an agency of federal government that gathers information on foreign military, economic and political activities. It also conducts covert political operations against governments to promote national security. The Central Intelligence Agency became incredibly active during the Cold War, which was mostly an intelligence war. During the years 1961 and 1963, the Central Intelligence Agency took many actions in attempt to fight communism and resolve the Cold War under Kennedy’s presidency.
The Central Intelligence Agency The CIA is one of the U.S. foreign intelligence agencies, responsible for getting and analyzing information about foreign governments, corporations, individuals, and reporting such information to the various branches of the U.S. government. The State Department's Bureau of Intelligence and Research and the Defense Department's Defense Intelligence Agency comprise the other two. Its headquarters is in Langley, Virginia, across the Potomac River from D.C. The Agency, created in 1947 by President Harry S. Trueman, is a descendant of the Office of Strategic Services (OSS) of World War 2. The OSS was dissolved in October 1945 but William J. Jonavan, the creator of the OSS, had submitted a proposal to President Roosevelt in 1944.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
The Central Intelligence Agency’s main responsibility is stated in its Vision statement: “We will provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals” (www.cia.gov). The CIA’s job is to provide pertinent, timely, and un-biased foreign intelligence. They also act as an unseen force by conducting undercover action as ordered by the President in order to preempt threats or achieve objectives of the United States. The CIA is the only intelligence organization that is not subject to cabinet prerogative, making it reliable in it is unbiased in its reports, because it has no political agenda. There are six main types of intelligence by which the CIA collects information. Human intelligence (HUMINT) is information gathered by field operatives through overt and covert techniques (www.cia.gov). Communications intelligence (COMINT) is acquired from intercepted foreign communications (www.cia.go...
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.