Preview

Cia Information and Systems

Good Essays
Open Document
Open Document
654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cia Information and Systems
What technologies can they use to guarantee CIA of their information and systems?
Define confidentiality – what I think it means – eg of technologies to guarantee confidentiality

CIA refers to the confidentiality, integrity and availability of an information system and is used as a yardstick for evaluating information systems security. CIA cannot be guaranteed in any organization, however there are many ways in which it can be improved.

First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.

Secondly, integrity in relation to information systems can be defined as keeping a business’s information free from accidental or intentional unauthorized changes (i.e. the information must be trustworthy). Integrity of information is of extreme importance for businesses such as hospitals and pharmacies, as the



References: http://it.med.miami.edu/x904.xml http://dictionary.reference.com/browse/confidential http://www.ccert.edu.cn/education/cissp/hism/019-021.html http://www.ccert.edu.cn/education/cissp/hism/021-023.html http://www.cccure.org/Documents/HISM/029-033.html Management Information Systems. Effy Oz. 6th Edition.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 001 Outcome 1 3 4

    • 265 Words
    • 1 Page

    Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Qcf Lvl 2 Confidentiality

    • 902 Words
    • 4 Pages

    Confidentiality is a right a person has in which to keep information about themselves private without anyone else being able to access it unless given permission or consent by an authorised person. A person's information should only be disclosed on a need to know basis i.e official bodies or next of kin unless specified otherwise. Information may also be disclosed if the information that is being held outweighs the risk to the person's health.…

    • 902 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    Just as the question states, data integrity is imperative to the success of a company’s operations. Data integrity is processing integrity which is one the five principles of systems reliability (Romney, & Steinbart, 2012, p. 274). For a company to be successful they must have a reliable system that is accurate, easily manipulated, timely, and valid (Romney, & Steinbart, 2012).…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Information Assurance (IA) mission becomes more important every day as technology becomes more advanced. The Information Assurance (IA) mission is to make all government equipment that is used to send classified and sensitive information impenetrable so that no one can hack into them and steal viable information belonging to the United States. These two missions together promote a single goal: information superiority for America and its Allies.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Terrorism is the warfare of the future. The battlefield has changed and it will take professional intelligence agencies to gather information about these unorthodox combatants. To help fight the war on terror, intelligence corporations must be present. However, some of the agencies can be combined with others to make a “super agency”. Three agencies that currently play a major role in the battle on terrorism will be the Federal Bureau of Investigations (FBI), Central Intelligence Agency (CIA), and the Defense Intelligence Agency (DIA). Discussion will be given on which agencies can be combined, what the roles of the agencies will be, and the function of each in the intelligence community. Furthermore, discussion will be given to what counterterrorism and counterintelligence tools the agencies will have available to them and what policies should be put in place to help combat terrorism in the future. The tools that will be used for counterterrorism will be the use of Special Operations Forces (SOF), unmanned aerial vehicle strikes (UAV’s), and cutting off funding to the terrorist organizations. Also the use of human intelligence, open source intelligence, and signal intelligence will be covered.…

    • 2750 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Paper on Ucmj

    • 959 Words
    • 4 Pages

    Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations and outcomes.…

    • 959 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Confidentiality is closely interwoven with the concept of privacy. Every individual has the right to privacy. Privacy requires that facts or information which have been shared by someone with another party remain private and are not disclosed without the permission of the person who gave them. Keeping information private and safe, passing on private information with the individual’s permission, only passing on information to others who have a right to it and need to know it.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cia Research

    • 1972 Words
    • 8 Pages

    The Central Intelligence Agency is the President’s independent foreign intelligence arm, responsible to him through the Director of National Intelligence and the National Security Council, and accountable to the people of the United States by interaction with the intelligence oversight committees of Congress. The CIA has many duties within those boundaries and performs a variety of functions through many forms of intelligence. They employ people from all backgrounds of academic study, from linguists to economists, along with people from varied ethnic backgrounds to work as specialists. It is a large agency with many responsibilities, but most importantly they perform critical work for the President regarding international intelligence.…

    • 1972 Words
    • 8 Pages
    Better Essays
  • Good Essays

    There seems to be an overarching idea that the Intelligence Community (IC) is not functionally operating to its fullest extent. There are many dissenters to the ICs structure and capabilities, referring the IC as inept and squandering opportunities, ignoring priorities. The ability to provide actionable and relevant intelligence to the ICs customers from the President, military, congress and policy makers is important to the wellbeing and safety of the U.S. The IC customers all rely on the proficiency of the IC and its capability to provide comprehensive and accurate intelligence to aid in the actives that dictate decisions and policies that not only affect the U.S. but also people all over the world. The structure of the IC has not been able to affectively change into the new war front that we are currently experiencing.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The National Intelligence Strategy defines the Intelligence Community Mission as “Provide timely, insightful, objective, and relevant intelligence to inform decisions on national security issues and events”. As well as providing the Intelligence Community with the unified Vision of “A nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence Community that exemplifies America’s values”. Theses extremely broad statements of guidance are further expounded upon throughout the National Intelligence Strategy but only to such an extent as to still be applicable to the entire Intelligence Community coalition.…

    • 1091 Words
    • 5 Pages
    Good Essays