Cyber Security CIA: Confidentiality, Integrity, and Availability

Verified

Added on  2023/01/18

|10
|2334
|49
AI Summary
This report provides an overview of the CIA model of cyber security, focusing on confidentiality, integrity, and availability. It discusses the major applications of the CIA triad, as well as its strengths and weaknesses. The report emphasizes the importance of implementing proper security measures to protect data and prevent unauthorized access.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY C.I.A
CYBER SECURITY C.I.A
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY C.I.A
Table of Contents
Introduction......................................................................................................................................2
About CIA.......................................................................................................................................2
The major application of CIA triad.................................................................................................4
CIA strengths and weakness............................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................8
Document Page
2CYBER SECURITY C.I.A
Introduction
The report aims at describing the CIA and its component. CIA is also known as
confidentiality, integrity and availability is a model that is designed for the purpose of providing
better information security within an organization. The main reason behind having a CIA
security is that it ensures better control over the data stored and also includes mechanisms for
protecting the types. The reason behind CIA is to create a clearinghouse for foreign policy
intelligence (Rawat and Bajracharya 2015). However it is important to analyze, evaluate and
convert actions for ensuring better security. The report will analyze all the main components of
CIA and the benefits that are associated with this.
About CIA
CIA is known as confidentiality, integrity and availability that offers model for providing
better information security within the organization. These three are most crucial components
associated with security. The principle of CIA is applicable for all the users within security
structure and ensures that all data are secured within information security (Rashmi 2018). The
information security is important for every organization so that it cannot be accessed by any
unauthorized person.
Confidentiality:
This ensures that the data is being accessed by authorized persons only. Confidentiality
is mainly concerned with providing privacy towards the data stored within an organization. The
organization needs to take proper preventive measures that will ensure transferring sensitive
information (Ani, He and Tiwari 2017.). The access provided towards the people is restricted and
Document Page
3CYBER SECURITY C.I.A
only few set of people has the access to view data. In addition to this confidentiality also ensures
that proper data is being categorized based on their priority. However it is observed that
safeguarding data confidentiality needs to come along with sensitive data. These become
important to maintain confidentiality because once the secret key gets disclosed or information
gets leaked it becomes difficult to protect the data (Leuprecht, Skillicorn and Tait 2016). This
type of failure in maintaining confidentiality leads to breaching. As per several surveys
maximum issues faced by organization arises due to improper way of managing the
confidentiality. After analyzing the confidentiality factor it becomes important to implement
ways that will ensure proper confidentiality towards the information stored. This becomes
essential to have proper way of protecting the data so that kit does not gets leaked (Ning and Liu
2012). The ways that are included in maintaining the confidentiality includes cryptography,
steganography and access control. Cryptography includes process of generating code that ensures
the transmission is taking place with the use of secret keys (Wurm et al. 2017). On the other hand
steganography is a technique that aims at hiding a piece of secret information with the use of non
secret image of text. Access control helps in preventing unauthorized person from accessing the
database.
Integrity:
This is referred to the way of ensuring that authenticity of information is maintained. It
becomes equally important to protect the data from further tampering and also should ensure that
the data transferred is authenticated. This ensures that data are not being altered by anyone at the
time of transmission (Schünemann and Baumann 2017). Once the information regarding any
business transmission occurs it becomes highly important to ensure proper safety and integrity so
that it can avoid problems. Tampering information has the ability to impact the organization in a

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER SECURITY C.I.A
wide way. This will become helpful for attackers and huge loss for the organization
(Konstantinou et al. 2105). After analyzing the importance of integrity it becomes important to
ensure that proper techniques are implemented that will maintain data integrity (Bloomfield et al.
2016). This includes input validation, hashing and digital signature. Input validation ensures that
the user name will get restricted to a certain level. Hashing offers integrity by using a
combination of hash function and secret key. Digital signature offers a better mathematical
technique that ensures no alteration in the message.
Availability:
Availability is referred to the fact that includes how information is accessible by users. It
is important for every organization and system to ensure that their services are available towards
the customers for maximum time. This will bring better benefits towards the organization (Von
Solms and Van Niekerk 2013). Thus it is important to ensure that the information maintained
within the system is easily accessible by everyone and by authorized persons only.
The major application of CIA triad
The major application of CIA is to provide security towards the information system. The
triad helps in restricting the access by limiting number of users and also ensures that data stored
within the information system is not accessed by any unauthorized persons. The main reason
behind implementing CIA triad is to ensure that the data stored and transferred are same and are
not tampered by external. Apart from this the major benefit that is obtained includes protecting
the data from unauthorized persons and ensuring the data from attacks. The cyber security CIA
will ensure that proper protection is provided towards the organization. The major application of
cyber security CIA is that it ensures proper protection towards the data stored within the
Document Page
5CYBER SECURITY C.I.A
organization (Klonoff 2015). The security also ensures better protection from data theft by
applying the CIA triad (Yeboah-Boateng 2013). With the growing technology it is observed that
cyber security will ensure better prevention from data thefts and will also ensure sensitive data.
This also ensures protecting the data from hackers by implementing proper firewall and using
strong password within the each system. The organization should also avoid connecting with Wi-
Fi so that it does not get impacted by hackers on the site. It is important to ensure that proper
security is implemented so that no hacker can enter within the site.
The major advantage that is offered with cyber security C.I.A is that improves the
security of cyberspace and the information stored within the system. The cyber defense within
the system also gets increased and the tasks performed within cyber get increased. The cyber
security also ensures proper protection towards the company data and information (Gollmann
and Krotofil 2016). Apart from this the system also protects from viruses and worms, Malware
and Spyware. Confidentiality is maintained towards the individual private information. Proper
protection is implemented so that it can ensure better protection from hackers and identity theft.
In addition to this there are several disadvantages that come along with cyber security
CIA is that it costs high for average users and small organizations. Sometimes it becomes
difficult to configure the firewalls within organization correctly (Yeboah-Boateng 2013). It is
important to make the system and software updated so that proper security can be maintained
within the system. This makes the system slower as compared to information system.
CIA strengths and weakness
The major strengths that come along with cyber security of CIA are that it offers better
hardware systems that are implemented along with firewalls and anti viruses. Apart from this one
Document Page
6CYBER SECURITY C.I.A
more strength that is associated with the organization is that the employees possess the ability. It
becomes important to encrypt each data using strong passwords so that it can be accessed by
only authorized persons (Demertzis Iliadis and Anezakis 2018). This will offer better
development of work related projects. This develops the security and enhances the strength of
system. Thus it can be stated as one of the major strengths of cyber security CIA.
Apart from the strength related to cyber security there are major weakness that has the
ability impact the process (Amoroso and Amoroso 2017). One of the major concerns is the lack
of funding that effects security aspects. Moreover there is a high chance of data getting breached
that can lead to equipment loss and sales loss. In addition to this there are challenges faced with
installing the new security system. The implementation requires huge cost and that becomes
difficult to maintain. It is observed that there is no such proper enforcement for intellectual
property protection.
Conclusion
Thus from the above report it can be stated that with implementation of proper cyber
security measures it will become easy to maintain the security towards data stored. The cyber
security CIA triangle plays a major role as it focuses on controlling the security aspects,
mechanisms and safeguarding the data. Several types of protection policies are implemented that
helps in enhancing the security of information stored. With the use of CIA triad all possible risks
are identified along with the possible solution for overcoming such situations. The report has
analyzed the functioning of CIA and the major concept related to cyber security. The aim is
protect the crucial data from theft and from getting breached. The report has described to
maintain the confidentiality, integrity and availability towards the information. The major ways

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY C.I.A
of ensuring confidentiality are cryptography, steganography and access control. Confidentiality
is a major factor as this aims at protecting the data from unauthorized person. The report has also
included the major application of CIA. CIA are mainly used in organization for providing a
better security towards the information stored within the organization. The last part of this report
has described the major strength and weakness that comes along with the implementation of
cybersceurity. CIA ensures that proper safety and security is provided towards the data stored
within the information system. However the major drawback is that it requires huge cost at the
time of implementation that turns to be a major drawback. Thus it can be stated CIA will provide
a better way of managing the information within the organization.
Document Page
8CYBER SECURITY C.I.A
References
Amoroso, E.G. and Amoroso, M.E., 2017. From CIA to APT: An Introduction to Cyber Security.
Independently published.
Ani, U.P.D., He, H. and Tiwari, A., 2017. Review of cybersecurity issues in industrial critical
infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), pp.32-
74.
Bloomfield, R., Bendele, M., Bishop, P., Stroud, R. and Tonks, S., 2016, June. The risk
assessment of ERTMS-based railway systems from a cyber security perspective: Methodology
and lessons learned. In International Conference on Reliability, Safety, and Security of Railway
Systems (pp. 3-19). Springer, Cham.
Demertzis, K., Iliadis, L.S. and Anezakis, V.D., 2018. An innovative soft computing system for
smart energy grids cybersecurity. Advances in Building Energy Research, 12(1), pp.3-24.
Gollmann, D. and Krotofil, M., 2016. Cyber-physical systems security. In The New
Codebreakers (pp. 195-204). Springer, Berlin, Heidelberg.
Klonoff, D.C., 2015. Cybersecurity for connected diabetes devices. Journal of diabetes science
and technology, 9(5), pp.1143-1147.
Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J. and Jin, Y., 2015, May.
Cyber-physical systems: A security perspective. In 2015 20th IEEE European Test Symposium
(ETS) (pp. 1-8). IEEE.
Document Page
9CYBER SECURITY C.I.A
Leuprecht, C., Skillicorn, D.B. and Tait, V.E., 2016. Beyond the Castle Model of cyber-risk and
cyber-security. Government Information Quarterly, 33(2), pp.250-257.
Ning, H. and Liu, H., 2012. Cyber-physical-social based security architecture for future internet
of things. Advances in Internet of Things, 2(01), p.1.
Rashmi, B.H., 2018. A Strategical Transition from Information Security to Cyber Security.
Rawat, D.B. and Bajracharya, C., 2015, April. Cyber security for smart grid systems: Status,
challenges and perspectives. In SoutheastCon 2015 (pp. 1-6). IEEE.
Schünemann, W.J. and Baumann, M.O. eds., 2017. Privacy, data protection and cybersecurity in
Europe. Springer International Publishing.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber
security. computers & security, 38, pp.97-102.
Wurm, J., Jin, Y., Liu, Y., Hu, S., Heffner, K., Rahman, F. and Tehranipoor, M., 2017.
Introduction to cyber-physical system security: A cross-layer perspective. IEEE Transactions on
Multi-Scale Computing Systems, 3(3), pp.215-227.
Yeboah-Boateng, E.O., 2013. Cyber-Security Challenges with SMEs in Developing Economies:
Issues of Confidentiality, Integrity & Availability (CIA). Institut for Elektroniske Systemer,
Aalborg Universitet.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]