logo

Implementation of CIA

   

Added on  2022-12-03

4 Pages768 Words382 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student:
Name of the University:

1CYBER SECURITY
Implementation of CIA
The digital devices are required for the business as more concerns are raised on the users
of security. In order to avoid the concerns, different measures are to be implemented for
measuring the security threats which are caused to the users. Confidentiality, integrity as well as
availability are CIA triangle which is a safety model which can create to direct the information
safety policies in the business (Tchernykh et al., 2016). This paper will evaluate the security
concerns as well as discuss of implementing CIA with the practical examples for demonstration
of importance of three areas.
Confidentiality is the safety standard which can control contact to the information. It is
being calculated to make sure that mistaken people are not gaining right to use to the confidential
information while it can ensure that correct people can able to access it. Protection of
confidentiality ensures that training is being provided those can share confidential data included
allowed users with the safety measures risk factors. The practical example of privacy is use of
the facts encryption (Melrose et al., 2016). Two-factor authentication is used for authenticate
users for accessing the confidential data while user ID as well as password are standard practice.
The integrity is assured that sensitive data is accurate. The sensitive data is not distorted
into shipment, as well as security measures like permissions of file, along with user access
controls are taken to make sure that it is not customized by the illegal users. Version controls are
to be taken to stop the unintended modifications as well as deletions from the unauthorized users.
Practical example of integrity is cryptographic checksums is used in order to verify the integrity.
Backups as well as redundancy plans are used to be implemented for restore the data in case
there is failure of integrity and security breach (Aminzade, 2018). It is used t restore the data

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Practice
|10
|3837
|96

Information Assurance Awareness
|9
|1523
|26

Information Security: CIA Triad, ATM Security, Biometric Authentication, Caesar Cipher
|13
|2577
|292

Cyber Security CIA: Confidentiality, Integrity, and Availability
|10
|2334
|49

Information Security: CIA Triad and Biometric Authentication
|16
|4179
|385

Information Security
|17
|4456
|84