Preview

The CIA Security Model (CIA Triad)

Good Essays
Open Document
Open Document
484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The CIA Security Model (CIA Triad)
As computer systems have become more and more sophisticated over the time, it has become less and less credible to ensure security by inspection and intuition alone. However, standard methods of analyzing different aspects of the area have been developed to identify and apply key principles of the area, but the area of Security Analysis is constantly developing as new secure designs are invented and so are the new ways of breaking them. In many cases, systems are so complex that it is impossible find a secure solution. In situations like such, instead improvement measures, one should focus towards counter-measures.
The CIA principle
One of the widely acceptable security model is the CIA triad, which stands for Confidentiality, Integrity and
…show more content…

Cryptography and Encryption methods are best ways to ensure confidentiality of data transferred from one computer to another.
 Integrity: The ability to ensure that data is an accurate and unchanged representation of the original secure information. One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.
 Availability: The best way to ensure Availability is by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a correctly functioning operating system environment that is free of software conflicts. It is also very important to keep current with all necessary system upgrades.
There are different types of solutions available, depending on the nature of the attack to defend against. Certain possible approaches are:
• Security by Design
Certain issues can be addressed by identifying and sticking to a set of guidelines such as writing secure code one must specify that particular library functions are considered "unsafe" and alternatives should be used. A program, which exhibits insecure behavior, can be rewritten to avoid


You May Also Find These Documents Helpful

  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Best Essays

    Having well-developed protocols on issues of security, as well as utilizing such well-developed protocols as part of a strategy in attending to security issues, and periodically reviewing such utilized security protocols as time passes-by in order to increase efficiency is the most enduring way to keep enriching the practices of , and in strengthening US homeland security. Due to lack of a single security protocol that could be utilized effectively in attending to all issues pertaining to security, the US government has continued to developing new security protocols, and equally deploys Existing Security Instruments (ESI) such as the…

    • 2640 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    2. Integrity is the property that data or information have not been altered or destroyed in an unauthorized manner. 3. Availability is the property that data or information is accessible and useable upon demand by an authorized person. 4.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Passwords, ID, Biometrics, Security Badge, Digital Certificates, Tokens; Always something you have, something that you are, something you know.…

    • 2012 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    All three are equally important in term of CIA Triad. However we can say one of them is more important then other according to the situation. Like you said in case of medical records Confidentiality is more important then other because everyone want privacy of their health record.…

    • 53 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    As World War II was approaching its conclusion, anticipation for after effects rose at an increasingly fast rate. As a result, the power’s of the world carefully observed and analyzed every move made, making sure that their strategies were superior and difficult to conquer. It was all due to the fact that there would be little rest for the Cold War would commence. The Allied Forces took the initiative and began preparing and formulating different ways to take Germany’s intelligence and technologies. An organization called the Joint Intelligence Objectives Agency (JIOA), composed of American and British troops, came up with the plan to strip Germany from their military, technological, and scientific developments by taking all of their geniuses, and thus Operation Paperclip commenced. Approximately 1,600 scientists and their families were…

    • 466 Words
    • 2 Pages
    Good Essays
  • Good Essays

    “We seek to develop policies and arrangements to make the peace both permanent and just. This can be done only on the basis of comprehensive and appropriate information” (Dwight D. Eisenhower). As the other countries start to build intelligence agencies after the WWII, it becomes more important America do build its own intelligence agency. Thus in 1947, the Central Intelligence Agency was created. Ever since, there had been a debate among the people if it’s necessary for the CIA to exists. America needs the CIA to protect the nation from terrorism, avoid any conflict with other nations, and compete with other countries’ intelligence agency.…

    • 482 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    What Is The CIA Triad

    • 80 Words
    • 1 Page

    This is a triangular concept of information security policies of all organization. CIA means confidentiality, integrity and availability also it covers all types of security in IT. In modern world people is completely relying on electronic equipment’s, Such as computers, smart phones, hard disk and cloud services for storing and processing valuable data. So security is an important issue to safeguard these resources. Therefore this security model will help to think and develop security policies for an organization.…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I agree that the Central Intelligence Agency (CIA) should not be a part of the Department of Homeland Security (DHS). DHS is over overwhelmed as you stated with its internal task of managing 22 separate agencies and their different missions towards the same goal. I do believe the DHS is an important part of our national security program. Still, the DHS was created too fast after 9/11 by political forces within the government with an agenda to appease the people and leverage a new way to mandate new legislation (Cohen, Cuéller, Weingast, 2006). The CIA is an integral part of our national defense and operates primarily overseas without the overburdened infrastructure of the DHS.…

    • 171 Words
    • 1 Page
    Satisfactory Essays