Cyber Security Report: CIA Implementation and Security Measures

Verified

Added on  2022/12/03

|4
|768
|382
Report
AI Summary
This report provides an overview of cyber security, emphasizing the implementation of the CIA triad: Confidentiality, Integrity, and Availability. It defines each component, explaining how they contribute to data protection within an organization. Confidentiality is discussed in terms of controlling access to information and ensuring that only authorized individuals can view sensitive data, with encryption and two-factor authentication as practical examples. Integrity is addressed by ensuring the accuracy and reliability of data, highlighting version controls and cryptographic checksums. Availability focuses on providing consistent and stable access to data, with disaster recovery plans and measures against denial-of-service attacks. The report emphasizes the importance of each aspect and provides real-world examples to illustrate their significance in maintaining a secure and reliable digital environment, including references to relevant academic sources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
Implementation of CIA
The digital devices are required for the business as more concerns are raised on the users
of security. In order to avoid the concerns, different measures are to be implemented for
measuring the security threats which are caused to the users. Confidentiality, integrity as well as
availability are CIA triangle which is a safety model which can create to direct the information
safety policies in the business (Tchernykh et al., 2016). This paper will evaluate the security
concerns as well as discuss of implementing CIA with the practical examples for demonstration
of importance of three areas.
Confidentiality is the safety standard which can control contact to the information. It is
being calculated to make sure that mistaken people are not gaining right to use to the confidential
information while it can ensure that correct people can able to access it. Protection of
confidentiality ensures that training is being provided those can share confidential data included
allowed users with the safety measures risk factors. The practical example of privacy is use of
the facts encryption (Melrose et al., 2016). Two-factor authentication is used for authenticate
users for accessing the confidential data while user ID as well as password are standard practice.
The integrity is assured that sensitive data is accurate. The sensitive data is not distorted
into shipment, as well as security measures like permissions of file, along with user access
controls are taken to make sure that it is not customized by the illegal users. Version controls are
to be taken to stop the unintended modifications as well as deletions from the unauthorized users.
Practical example of integrity is cryptographic checksums is used in order to verify the integrity.
Backups as well as redundancy plans are used to be implemented for restore the data in case
there is failure of integrity and security breach (Aminzade, 2018). It is used t restore the data
Document Page
2CYBER SECURITY
back to the accurate state. The banks are worried about honesty of the monetary records. The
bank account holders can go away the ATM receipts unrestricted as well as hanged around after
there is withdrawing of cash. It is key significant into the information safety measures within the
banking system.
Availability is assurance of consistent as well as stable access to the responsive data by
means of the official persons. It is used by maintaining of the hardware as well as software
which are required to make sure that there is availability of the sensitive data. It is required to
upgrade the system. The security measures are included redundancy, clustering as well as RAID
which is required to measure the security and eliminate the availability issues. Disaster recovery
plan is used in this case for preventing from the worst case scenarios. It is based on executing the
disaster recovery plan (Biswas, Gupta, & Haque, 2019). The unpredictable events are safeguards
against the interruptions into connections plus loss of data such as fire in addition to natural
disaster. Practical example of availability is denial-of-service (DOS) attacks which are used to
prevent downtime because of the malicious attacks as well as network intrusions.
Document Page
3CYBER SECURITY
References
Aminzade, M. (2018). Confidentiality, integrity and availability–finding a balanced IT
framework. Network Security, 2018(5), 9-11.
Biswas, C., Gupta, U. D., & Haque, M. M. (2019, February). An efficient algorithm for
confidentiality, integrity and authentication using hybrid cryptography and
steganography. In 2019 International Conference on Electrical, Computer and
Communication Engineering (ECCE) (pp. 1-5). IEEE.
Melrose, J., Wrona, K., Guenther, T., Haakseth, R., Nordbotten, N., & Westerdahl, L. (2016,
May). Labelling for integrity and availability. In 2016 International Conference on
Military Communications and Information Systems (ICMCIS)(pp. 1-8). IEEE.
Tchernykh, A., Schwiegelsohn, U., Talbi, E. G., & Babenko, M. (2016). Towards understanding
uncertainty in cloud computing with risks of confidentiality, integrity, and
availability. Journal of Computational Science.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]