Preview

Information Security

Good Essays
Open Document
Open Document
813 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
information security.
1. What do you understand by information security? Explain the CIA triad.
Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.
The CIA triad: stands for C-Confidentiality, I-Integrity and A-Availability is one of the core principles of information security which should be guaranteed in any kind of secure system.This principle is applicable across the whole subject of Security Analysis, from access to a user's internet history to security of encrypted data across the internet. If any one of the three can be breached it can have serious consequences for the parties concerned.
CONFIDENTIALITY: Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data transferred from one computer to another.
INTEGRITY: In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The three components of the CIA triangle are confidentiality, integrity, and availability of information. These components are used as the industry standard for computer security and they describe the utility of information.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz: Security Program

    • 357 Words
    • 2 Pages

    | Integrity involves implementation of the necessary level of secrecy and prevention of unauthorized disclosure of sensitive information and resources.Answer…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    End user will receive what is sent-guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The AIC Triad

    • 472 Words
    • 2 Pages

    Confidentiality limits how much access a person has to certain information. For example, a janitor would not have as much access to the secret information of a company as say the IT specialist of that company. The most accurate way to ensure that the data has not been compromised is to set restrictions on every person that is hired into the business and only allow people to have access to the information that will…

    • 472 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Global called upon the expertise of CIS-its own Security Division. CIS’s information risk management (IRM) strategy brings together, within a global framework, all the components that an organization needs to plan and implement an end-to-end approach for protecting a business’s most critical information assets.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 276

    • 374 Words
    • 2 Pages

    8.What is an integrity constraint and why are they used? which is expressed by a set of integrity rules or constraints, refers to the correctness of data. Basically it puts it in a certain subject its correct field. It organizes it…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality H+S lvl 2

    • 3984 Words
    • 16 Pages

    Confidentiality means not sharing information about people without their knowledge or consent. It is ensuring that all information stored either on paper or electronically is inaccessible to anyone who does not have permission to access it.…

    • 3984 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The CIA (Central Intelligence Agency) is specialized in human espionage, used to spy on every citizen as long as it have an special purpose, which means, something that could involve the government in general.…

    • 656 Words
    • 3 Pages
    Satisfactory Essays