logo

Cyber Security CIA: Confidentiality, Integrity, and Availability

   

Added on  2023-01-18

10 Pages2334 Words49 Views
Running head: CYBER SECURITY C.I.A
CYBER SECURITY C.I.A
Name of the Student
Name of the University
Author Note

1CYBER SECURITY C.I.A
Table of Contents
Introduction......................................................................................................................................2
About CIA.......................................................................................................................................2
The major application of CIA triad.................................................................................................4
CIA strengths and weakness............................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................8

2CYBER SECURITY C.I.A
Introduction
The report aims at describing the CIA and its component. CIA is also known as
confidentiality, integrity and availability is a model that is designed for the purpose of providing
better information security within an organization. The main reason behind having a CIA
security is that it ensures better control over the data stored and also includes mechanisms for
protecting the types. The reason behind CIA is to create a clearinghouse for foreign policy
intelligence (Rawat and Bajracharya 2015). However it is important to analyze, evaluate and
convert actions for ensuring better security. The report will analyze all the main components of
CIA and the benefits that are associated with this.
About CIA
CIA is known as confidentiality, integrity and availability that offers model for providing
better information security within the organization. These three are most crucial components
associated with security. The principle of CIA is applicable for all the users within security
structure and ensures that all data are secured within information security (Rashmi 2018). The
information security is important for every organization so that it cannot be accessed by any
unauthorized person.
Confidentiality:
This ensures that the data is being accessed by authorized persons only. Confidentiality
is mainly concerned with providing privacy towards the data stored within an organization. The
organization needs to take proper preventive measures that will ensure transferring sensitive
information (Ani, He and Tiwari 2017.). The access provided towards the people is restricted and

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Role of Cryptography in Cyber Security: Assignment
|11
|3457
|92

Information Security
|17
|4456
|84

IT Risk Management: Cyber Security
|20
|4610
|231

Security Strategies Laws and Implementation
|7
|2076
|68

Security Strategies Laws and Implementation
|7
|1814
|36

Cyber Algorithms for Australian MHR System
|26
|780
|240