logo

Fundamental Concepts of Information System Security

   

Added on  2023-01-12

9 Pages2417 Words66 Views
Running head: PICT848 APPLIED CYBER SECURITY
Pict848 Applied Cyber Security
Name of the Student
Name of the University
Author Note:

PICT848 APPLIED CYBER SECURITY1
Introduction
Computer and other related systems have become an important part of business and
commerce. With the passage of time, they become major point of target for attackers1. If an
individual wants to make use of system with confidence, then they need to assure the fact that the
devices are not comprised in anyhow. All the required communication with the devices needs to
be secured anyhow2.
In the essay, an idea has been provided with respect to fundamental concepts of
information system security along with various measures for mitigating the threats. An analysis
has been done with respect to method how the organization can easily stay secure. Various
measures have been discussed by which organization can improve the security has been
discussed.
Discussion
Information Security Triad
Confidentiality
At the instance of protecting information, user needs to restrict or stop the access to the
individual who is required view it. Everyone who is disallowed from learning needs to have an
idea with respect to complete content3. It is the complete essence of confidentiality like federal
laws needed to restricting the access to university.
1 Sumra, Irshad Ahmed, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan. "Attacks on security goals
(confidentiality, integrity, availability) in VANET: a survey." In Vehicular Ad-Hoc Networks for Smart Cities, pp.
51-61. Springer, Singapore, 2015.
2 Treacy, Ceara, and Fergal McCaffery. "Data security overview for medical mobile apps assuring the
confidentiality, integrity and availability of data in transmission." (2017).

PICT848 APPLIED CYBER SECURITY2
Integrity
Integrity is all about assurance of the given information which is being accessed, is not
altered anyhow and aims to highlight the required thing. Information integrity is all about
making use of information which highlights the intended meaning. Information can easily lose its
integrity by the help of malicious content like a person who is not authorized to make change
intentionally4.
Availability
Proper availability of information is considered to be a part of CIA triad. The availability
point mainly tends to highlight the fact the given information can be easily accessed and
modified by any authorized person5. Based on the kind of information proper timeframe can
result in different kind of meanings. Both data and information system are made are available as
per the need6.
Tools for Information Security
3 Gaetani, Edoardo, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro
Sassone. "Blockchain-based database to ensure data integrity in cloud computing environments." (2017).
4 Fernandez, Alberto, and Karwe Markus Alexander. "Data Privacy and Confidentiality." iURBAN: Intelligent
Urban Energy Tool (2016): 35.
5 Renu, S., and SH Krishna Veni. "An Enhanced CIA tree Using String Matching Algorithm." International Journal
of Applied Engineering Research 12, no. 16 (2017): 6123-6126.
6 Sumathi, A., and B. Vinayaga Sundaram. "An ANN approach in ensuring CIA triangle using an energy based
secured protocol E-AODV for enhancing the performance in MANETS." Indian Journal of Science and Technology
8, no. 34 (2015): 1-10.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Practice
|10
|3837
|96

Cyber-security Assesment Report
|4
|890
|8

CIA Model Analysis: Strengths, Weaknesses, and Comparison with Other Models
|12
|3813
|70

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

Cybersecurity Threat Name of the Student
|11
|2321
|49

Cyber Security CIA: Confidentiality, Integrity, and Availability
|10
|2334
|49