Information Security Technologies: Analysis of CIA Application

Verified

Added on  2023/03/30

|7
|1186
|223
Report
AI Summary
This report provides a detailed analysis of information security technologies, emphasizing the core concepts of Confidentiality, Integrity, and Availability (CIA). It explores how these principles are applied to secure people, processes, and technology within an organization. The discussion covers data encryption, access controls, and disaster recovery planning as key components in maintaining information security. The report concludes that the CIA triad is fundamental for safeguarding information from various threats and ensuring business resilience through effective implementation of security strategies.
Document Page
Running head: ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Analysis of Information Security Technologies
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Information Security technologies related to Confidentiality, Integrity and Availability...........2
Analysis of the application of Information Security concepts in providing security to people,
process and technology................................................................................................................4
Conclusion.......................................................................................................................................5
References........................................................................................................................................6
Document Page
2ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Introduction
Information Security is regarded as the methods or a process that helps in keeping
information safe while maintaining their confidentiality, integrity and availability. It also
includes controlling the access of information while preventing unauthorized access of personnel
into systems. Threats to information can come in various forms such as phishing attacks or
malware attacks and even ransom ware attacks (Kumar, Raj & Jelciana, 2018). Information
security concept means to secure the policies and processes as well as data from destruction
while involving measures such as digital security. This report reflects the detailed analysis of
Information Security technologies related to their basic concepts and their application to provide
security of information to people, process and technologies.
Discussion
Information Security technologies related to Confidentiality, Integrity and
Availability
All types of evidence security help in addressing one of the three major goals such as-
Shielding the confidentiality of data
Conserving the integrity of data
Encouraging the availability of data from unauthorized access.
All these three goals of Information Security form the foundation of all kinds of safety
databases. For any professionals creating policies and procedures for any organization so as to
ensure information security within the system must abide by each of these goals (Sharkov, 2016).
Document Page
3ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Confidentiality, Integrity and Availability are known as the basic model of creating any security
policies within an organization (Aminzade, 2018). The model is also recognized as the AIC triad.
The components of the CIA triad are mentioned as follows:
1. Confidentiality: This refers to a set of policies and processes that helps in limiting the access
to any information within an organization. The Confidentiality principle that is designed under
the CIA triad module hence prevents the use of sensitive information without authorized access
while preventing it from getting damaged from any unintended means (Aloraini & Hammoudeh,
2017). One example where the set of rules related to confidentiality is applied is in case of
account numbers during online banking process. Here, mention should be made of Data
Encryption method that ensures confidentiality of information within organization.
2. Integrity: Integrity includes maintain the accuracy, consistency and dependability of
information during its life sequence. The policy that it follows includes that the statistics should
not be altered or altered by unlicensed access leading to breach of information. The measures
that are taken under this module consist of gaining permission to access any files while enabling
access controls. In this context, mention can be made of visual control method that includes
prevention of accidental deletion of files by unauthorized access leading to server crash or even
electromagnetic impulse.
3. Availability: The last but not the least among the three ideologies of information security is
the availability. This ensures the regular maintain of the hardware, while looking after to the
hardware repair requirements, maintain the smooth function ability of the operating systems and
also keeping systems up to date to the latest version. This principle also includes preventing the
bottle neck occurrence and providing adequate bandwidth for communication. Fast and adaptive
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
recovery of disasters plays a vital role in the worst case scenarios in this context. All the
information is safeguarded against any type of major data loss while backing up the copies of
documents in a geographically isolated location.
Analysis of the application of Information Security concepts in providing security to
people, process and technology
Among the three basic principles of CIA, the confidentiality principle is basically
concerned with the prevention of information from unauthorized access (Vai et al., 2015). In this
respect, it can be applied to technology such as Cryptography where its effectiveness among
organizations can help in ensuring security of data as it becomes very difficult to crack a
cryptographic system. Access control is another area that ensures confidentiality that includes
Mandatory Access Control where the administrators are only given rights to make changes to the
information database with prior access permissions.
Next comes is the Integrity principle. Integrity principle can be verified with the help of
hashing algorithm where a hash message gets generated in order to append the end of a message.
The Integrity principle also includes maintaining the internal as well as external consistency of
data ensuring the safety of the items stored within database systems.
The final principle that is the Availability principle can be applied in case of Distributive
allocation or in other terms load balancing (Qadir & Quadri, 2016). It allows the distribution of
loaded files so that the device does not get overloaded. Availability principle is also applied in
preparing disaster recovery plan as it helps organizations to respond to the disasters that are pre-
identified while restoring the services immediately.
Document Page
5ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Conclusion
Hence it can be concluded that CIA triad forms an important triangle for ensuring
security of information related to technology people and processes within organization and needs
to be implemented effectively within organization so as to safeguard the information from all
types of risks and future threats. Confidentiality, Integrity and Availability of the CIA triad forms
the basic model to lead all the strategies associated with the safety of information within
organization. Most of the IT organizations nowadays are focused on protecting their systems
from the loss of data due to theft while compromising the confidentiality, integrity and
availability of the data and hence these three principles forms the security triad while protecting
the data loss. Various technologies can be collaborated with this triad such as cryptography,
hashing algorithm, mandatory access control, Big Data, IoT along with computing.
Implementation of CIA triad within organization also helps in improving the resilience of the
business and thus needs to be adopted with proper strategies in place.
Document Page
6ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
References
Aloraini, A., & Hammoudeh, M. (2017, July). A survey on data confidentiality and privacy in
cloud computing. In Proceedings of the International Conference on Future Networks
and Distributed Systems (p. 10). ACM.
Aminzade, M. (2018). Confidentiality, integrity and availability–finding a balanced IT
framework. Network Security, 2018(5), 9-11.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in
cloud computing. Procedia Computer Science, 125, 691-697.
Qadir, S., & Quadri, S. M. K. (2016). Information availability: An insight into the most
important attribute of information security. Journal of Information Security, 7(03), 185.
Sharkov, G. (2016, October). From cybersecurity to collaborative resiliency. In Proceedings of
the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense (pp.
3-9). ACM.
Vai, M., Nahill, B., Kramer, J., Geis, M., Utin, D., Whelihan, D., & Khazan, R. (2015,
September). Secure architecture for embedded systems. In 2015 IEEE High Performance
Extreme Computing Conference (HPEC) (pp. 1-5). IEEE.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]