Preview

Information Security

Good Essays
Open Document
Open Document
813 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
information security.
1. What do you understand by information security? Explain the CIA triad.
Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.
The CIA triad: stands for C-Confidentiality, I-Integrity and A-Availability is one of the core principles of information security which should be guaranteed in any kind of secure system.This principle is applicable across the whole subject of Security Analysis, from access to a user's internet history to security of encrypted data across the internet. If any one of the three can be breached it can have serious consequences for the parties concerned.
CONFIDENTIALITY: Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data transferred from one computer to another.
INTEGRITY: In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz: Security Program

    • 357 Words
    • 2 Pages

    | The main objective of information security is to preserve the availability, integrity, and confidentiality of information and knowledge of an organization.Answer…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    End user will receive what is sent-guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Global called upon the expertise of CIS-its own Security Division. CIS’s information risk management (IRM) strategy brings together, within a global framework, all the components that an organization needs to plan and implement an end-to-end approach for protecting a business’s most critical information assets.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 276

    • 374 Words
    • 2 Pages

    8.What is an integrity constraint and why are they used? which is expressed by a set of integrity rules or constraints, refers to the correctness of data. Basically it puts it in a certain subject its correct field. It organizes it…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The AIC Triad

    • 472 Words
    • 2 Pages

    The AIC Triad is an acronym that stands for Availability, Integrity, and Confidentiality; these are the three core principles when dealing with IT security. Availability is based on the concept of when a person wants the information that person able to have it and does not have to wait too long or the information is not destroyed. Integrity involves only who can edit the valuable information. Confidentiality is mainly the restrictions set upon who can actually see the information as well as who is allowed to modify or delete that information as well. Even though each of these principles are valuable to IT security, the most important one of them all is Confidentiality because there has to be a set limit to how much information a person is able to see when he/she is logged into a secure system.…

    • 472 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The CIA (Central Intelligence Agency) is specialized in human espionage, used to spy on every citizen as long as it have an special purpose, which means, something that could involve the government in general.…

    • 656 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Ethics

    • 1702 Words
    • 7 Pages

    CIA is a commonly used standard for information systems security, concentrating on the 3 core goals of confidentiality, integrity and availability of information in the system.…

    • 1702 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Confidentiality H+S lvl 2

    • 3984 Words
    • 16 Pages

    Confidentiality means not sharing information about people without their knowledge or consent. It is ensuring that all information stored either on paper or electronically is inaccessible to anyone who does not have permission to access it.…

    • 3984 Words
    • 16 Pages
    Satisfactory Essays