Preview

Cia Information and Systems

Good Essays
Open Document
Open Document
654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cia Information and Systems
What technologies can they use to guarantee CIA of their information and systems?
Define confidentiality – what I think it means – eg of technologies to guarantee confidentiality

CIA refers to the confidentiality, integrity and availability of an information system and is used as a yardstick for evaluating information systems security. CIA cannot be guaranteed in any organization, however there are many ways in which it can be improved.

First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.

Secondly, integrity in relation to information systems can be defined as keeping a business’s information free from accidental or intentional unauthorized changes (i.e. the information must be trustworthy). Integrity of information is of extreme importance for businesses such as hospitals and pharmacies, as the



References: http://it.med.miami.edu/x904.xml http://dictionary.reference.com/browse/confidential http://www.ccert.edu.cn/education/cissp/hism/019-021.html http://www.ccert.edu.cn/education/cissp/hism/021-023.html http://www.cccure.org/Documents/HISM/029-033.html Management Information Systems. Effy Oz. 6th Edition.

You May Also Find These Documents Helpful

  • Powerful Essays

    TranquilityDaySpaPlan

    • 4719 Words
    • 97 Pages

    confidential in nature, other than information which is in the public domain through other means and…

    • 4719 Words
    • 97 Pages
    Powerful Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    America’s Central Intelligence Agency (CIA) was officially established through the National Security Act of 1947, but the concept of intelligence gathering had existed since the days of the Revolutionary War. The CIA is the successor to the Office of Strategic Services (OSS), which was created in 1942 to help organize espionage activities during World War II. The mission of the CIA is to collect bits of strategic information in order to protect the United States of America from foreign enemies. The intelligence is then given to the President and senior government policy makers. Along with CIA officials, they analyze it and make decisions based upon what they find, in order to protect the country from potential enemies and terrorist plots. The current Director of the CIA is Leon Edward Panetta, who was…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The National Intelligence Strategy defines the Intelligence Community Mission as “Provide timely, insightful, objective, and relevant intelligence to inform decisions on national security issues and events”. As well as providing the Intelligence Community with the unified Vision of “A nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence Community that exemplifies America’s values”. Theses extremely broad statements of guidance are further expounded upon throughout the National Intelligence Strategy but only to such an extent as to still be applicable to the entire Intelligence Community coalition.…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    The Information Assurance (IA) mission becomes more important every day as technology becomes more advanced. The Information Assurance (IA) mission is to make all government equipment that is used to send classified and sensitive information impenetrable so that no one can hack into them and steal viable information belonging to the United States. These two missions together promote a single goal: information superiority for America and its Allies.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 4222-201 Essay

    • 1063 Words
    • 5 Pages

    Confidentiality means keeping personal information safe, so that electronic and written information cannot be accessed by anyone that doesn’t need to see it. Also not sharing someone's information without their prior consent. This is covered by the Data Protection Act 1998.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Confidentiality means not sharing information about individuals without their knowledge and agreement and ensuring that written and electronic information cannot be accessed or read by people who have no reason to see it.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Cia Research

    • 1972 Words
    • 8 Pages

    The Central Intelligence Agency is the President’s independent foreign intelligence arm, responsible to him through the Director of National Intelligence and the National Security Council, and accountable to the people of the United States by interaction with the intelligence oversight committees of Congress. The CIA has many duties within those boundaries and performs a variety of functions through many forms of intelligence. They employ people from all backgrounds of academic study, from linguists to economists, along with people from varied ethnic backgrounds to work as specialists. It is a large agency with many responsibilities, but most importantly they perform critical work for the President regarding international intelligence.…

    • 1972 Words
    • 8 Pages
    Better Essays
  • Good Essays

    unit 1 2 and 3

    • 1651 Words
    • 1 Page

    4.1 Confidentiality means not sharing information about people without their knowledge and agreement, and making sure that written and electronic information cannot be accessed by people who have no reason to see it.…

    • 1651 Words
    • 1 Page
    Good Essays
  • Good Essays

    There seems to be an overarching idea that the Intelligence Community (IC) is not functionally operating to its fullest extent. There are many dissenters to the ICs structure and capabilities, referring the IC as inept and squandering opportunities, ignoring priorities. The ability to provide actionable and relevant intelligence to the ICs customers from the President, military, congress and policy makers is important to the wellbeing and safety of the U.S. The IC customers all rely on the proficiency of the IC and its capability to provide comprehensive and accurate intelligence to aid in the actives that dictate decisions and policies that not only affect the U.S. but also people all over the world. The structure of the IC has not been able to affectively change into the new war front that we are currently experiencing.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Terrorism is the warfare of the future. The battlefield has changed and it will take professional intelligence agencies to gather information about these unorthodox combatants. To help fight the war on terror, intelligence corporations must be present. However, some of the agencies can be combined with others to make a “super agency”. Three agencies that currently play a major role in the battle on terrorism will be the Federal Bureau of Investigations (FBI), Central Intelligence Agency (CIA), and the Defense Intelligence Agency (DIA). Discussion will be given on which agencies can be combined, what the roles of the agencies will be, and the function of each in the intelligence community. Furthermore, discussion will be given to what counterterrorism and counterintelligence tools the agencies will have available to them and what policies should be put in place to help combat terrorism in the future. The tools that will be used for counterterrorism will be the use of Special Operations Forces (SOF), unmanned aerial vehicle strikes (UAV’s), and cutting off funding to the terrorist organizations. Also the use of human intelligence, open source intelligence, and signal intelligence will be covered.…

    • 2750 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays