This report provides a detailed analysis of Information Security technologies related to their basic concepts and their application to provide security of information to people, process and technologies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES Analysis of Information Security Technologies Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES Table of Contents Introduction......................................................................................................................................2 Discussion........................................................................................................................................2 Information Security technologies related to Confidentiality, Integrity and Availability...........2 Analysis of the application of Information Security concepts in providing security to people, process and technology................................................................................................................4 Conclusion.......................................................................................................................................5 References........................................................................................................................................6
2ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES Introduction Information Security is regarded as the methods or a process that helps in keeping information safe while maintaining their confidentiality, integrity and availability. It also includes controlling the access of information while preventing unauthorized access of personnel into systems. Threats to information can come in various forms such as phishing attacks or malware attacks and even ransom ware attacks (Kumar, Raj & Jelciana, 2018). Information security concept means to secure the policies and processes as well as data from destruction while involving measures such as digital security. This report reflects the detailed analysis of Information Security technologies related to their basic concepts and their application to provide security of information to people, process and technologies. Discussion Information Security technologies related to Confidentiality, Integrity and Availability All types of evidence security help in addressing one of the three major goals such as- Shielding the confidentiality of data Conserving the integrity of data Encouraging the availability of data from unauthorized access. All these three goals of Information Security form the foundation of all kinds of safety databases. For any professionals creating policies and procedures for any organization so as to ensure information security within the system must abide by each of these goals (Sharkov, 2016).
3ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES Confidentiality, Integrity and Availability are known as the basic model of creating any security policies within an organization (Aminzade, 2018). The model is also recognized as the AIC triad. The components of the CIA triad are mentioned as follows: 1. Confidentiality: This refers to a set of policies and processes that helps in limiting the access to any information within an organization. The Confidentiality principle that is designed under the CIA triad module hence prevents the use of sensitive information without authorized access while preventing it from getting damaged from any unintended means (Aloraini & Hammoudeh, 2017). One example where the set of rules related to confidentiality is applied is in case of account numbers during online banking process. Here, mention should be made of Data Encryption method that ensures confidentiality of information within organization. 2. Integrity: Integrity includes maintain the accuracy, consistency and dependability of information during its life sequence. The policy that it follows includes that the statistics should not be altered or altered by unlicensed access leading to breach of information. The measures that are taken under this module consist of gaining permission to access any files while enabling access controls. In this context, mention can be made of visual control method that includes prevention of accidental deletion of files by unauthorized access leading to server crash or even electromagnetic impulse. 3. Availability: The last but not the least among the three ideologies of information security is the availability. This ensures the regular maintain of the hardware, while looking after to the hardware repair requirements, maintain the smooth function ability of the operating systems and also keeping systems up to date to the latest version. This principle also includes preventing the bottle neck occurrence and providing adequate bandwidth for communication. Fast and adaptive
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES recovery of disasters plays a vital role in the worst case scenarios in this context. All the information is safeguarded against any type of major data loss while backing up the copies of documents in a geographically isolated location. Analysis of the application of Information Security concepts in providing security to people, process and technology Among the three basic principles of CIA, the confidentiality principle is basically concerned with the prevention of information from unauthorized access (Vai et al., 2015). In this respect, it can be applied to technology such as Cryptography where its effectiveness among organizations can help in ensuring security of data as it becomes very difficult to crack a cryptographic system. Access control is another area that ensures confidentiality that includes Mandatory Access Control where the administrators are only given rights to make changes to the information database with prior access permissions. Next comes is the Integrity principle. Integrity principle can be verified with the help of hashing algorithm where a hash message gets generated in order to append the end of a message. The Integrity principle also includes maintaining the internal as well as external consistency of data ensuring the safety of the items stored within database systems. The final principle that is the Availability principle can be applied in case of Distributive allocation or in other terms load balancing (Qadir & Quadri, 2016). It allows the distribution of loaded files so that the device does not get overloaded. Availability principle is also applied in preparing disaster recovery plan as it helps organizations to respond to the disasters that are pre- identified while restoring the services immediately.
5ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES Conclusion Hence it can be concluded that CIA triad forms an important triangle for ensuring security of information related to technology people and processes within organization and needs to be implemented effectively within organization so as to safeguard the information from all types of risks and future threats.Confidentiality, Integrity and Availability of the CIA triad forms the basic model to lead all the strategies associated with thesafety of information within organization. Most of the IT organizations nowadays are focused on protecting their systems from the loss of data due to theft while compromising the confidentiality, integrity and availability of the data and hence these three principles forms the security triad while protecting the data loss. Various technologies can be collaborated with this triad such as cryptography, hashing algorithm, mandatory access control, Big Data, IoT along with computing. Implementation of CIA triad within organization also helps in improving the resilience of the business and thus needs to be adopted with proper strategies in place.
6ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES References Aloraini, A., & Hammoudeh, M. (2017, July). A survey on data confidentiality and privacy in cloud computing. InProceedings of the International Conference on Future Networks and Distributed Systems(p. 10). ACM. Aminzade, M. (2018). Confidentiality, integrity and availability–finding a balanced IT framework.Network Security,2018(5), 9-11. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing.Procedia Computer Science,125, 691-697. Qadir, S., & Quadri, S. M. K. (2016). Information availability: An insight into the most important attribute of information security.Journal of Information Security,7(03), 185. Sharkov, G. (2016, October). From cybersecurity to collaborative resiliency. InProceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense(pp. 3-9). ACM. Vai, M., Nahill, B., Kramer, J., Geis, M., Utin, D., Whelihan, D., & Khazan, R. (2015, September). Secure architecture for embedded systems. In2015 IEEE High Performance Extreme Computing Conference (HPEC)(pp. 1-5). IEEE.