Preview

Research Paper On Aic Triad

Good Essays
Open Document
Open Document
482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Paper On Aic Triad
What is the AIC triad? The AIC triad is refers to availability, integrity, and confidentiality. Availability is the access to the information needed. Access no matter where or when the person tries to access the information he wants. Availability is seen in popular websites like youtube, yahoo, and google, where we can access the information wherever and whenever we want it. Integrity means that the information is shown is accurate. Not only accurate but also that the information is not tampered with. Meaning the information someone sees will not be altered unless intentionally altered by the creator. Integrity can be seen when information on these websites are not changed. Lastly, confidentiality is the limited access to certain information. Meaning confidentiality gives access to only authorized users and not access to unauthorized users. Out of all 3, availability is most important.

Availability is the most important of the other 2 security points in the AIC triad. Availability, allows for the access of data or
…show more content…
The first consequence of not having availability is upsetting the user by the system not being available. For example in article 1 by Mase Consulting talked stated a user will think “ I want the information to do my job it is there for me ... 1. I don't have to wait too long for I” Availability is important because without it, it may upset the user. Thus, not make the user return to the website or the office return to that company. Also, in the second article by Chad Perrin he states for there to be availability, “Systems, access channels, and authentication mechanisms must all be working properly for the information they provide and protect to be available when needed.” In short, for information to even be changed it has to be availability. Making availability important for the not only the user but also the editor to the

You May Also Find These Documents Helpful

  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    * Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    1. What are the three fundamental elements of an effective access control solution for information systems?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Passive Monitoring Policy. Today we have also included a Summary Form for you to complete.…

    • 520 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Triad Summary Paper

    • 2396 Words
    • 10 Pages

    The client, Gloria, is a middle aged Caucasian woman who is about 35 to 40 years old. She was just recently divorced with one child, a young daughter. The two psychotherapists who interviewed Gloria are Dr. Albert Ellis and Dr. Carl Rogers. Dr. Albert Ellis is a male Caucasian who is about 45 years old. Dr. Carl Rogers is also a male psychotherapist who is about the same age as…

    • 2396 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    a. (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3) Which of the following is not a feature that is driving social e-commerce growth? 3)…

    • 2051 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    (ISACA®) (www.isaca.org) is a recognised worldwide leader in IT governance, control, security and assurance. Founded…

    • 8174 Words
    • 33 Pages
    Better Essays