Cyber Security: CIA Triad and its Importance - Essay

Verified

Added on  2023/01/10

|4
|820
|48
Essay
AI Summary
This essay provides an overview of cyber security, emphasizing the crucial aspects of confidentiality, integrity, and availability. It defines cyber security as the protection of software, computer information resources, and computer systems. The essay discusses the increasing reliance on the internet in business and ICT, along with associated threats such as phishing, ransomware, and various malware. It then delves into the three main components of cyber security: confidentiality, which controls information access through cryptography, digital certificates, and biometric verification; integrity, which ensures the trustworthiness of data by preventing unauthorized changes and utilizing cryptography checksums; and availability, which guarantees constant access to data through faster recovery plans and backup protocols. The essay concludes by highlighting the importance of these components in providing effective protection for sensitive information resources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Cyber Security
ESSAY
ON
CYBER SECURITY
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Cyber Security
The purpose of this report is to briefly explain the concept of Cyber Security
considering the three major aspect of it, which includes Cyber Confidentiality, Integrity and
Availability. Cyber Security stands to protect or secure software, computer information
resource and computer systems as well (Craigen, Diakun-Thibault & Purse, 2014).
Considering the current business development and ICT industries the usage of internet
network has increased to a high extend. However, internet has offered the industries several
benefits there are also various drawbacks which includes Phishing, Ransomware, Rootkit,
Spyware, Virus, Zero-day exploit and Trojans present in the scenario of Computer network.
Thus, in order to mitigate the possibilities of these attacks the report will explore about the
three major components of Cyber Security which will provide a detail description on
effective Cyber Security.
Aspects of Cyber-Security:
While considering the effectiveness of Cyber Security the major aspects has been
observed which will help to provide high security to the computer devices, networks and
information resources as well. The cyber security aspect includes Confidentiality, Integrity
and Availability.
Confidentiality:
In the field of Cyber Security Confidentiality is on of the significant aspect of data
security which controls information access. The necessity of keeping the information with
high security occurred due to several fields which include military operations, government
activity information and other confidential detail of civilian. Initially in the cyber security
field the first attempt was to secure the information of military. The fundamental principle of
this aspect is to control the access of information which supports confidentiality by the
approach of Key Cryptography. However, utilization of Cryptography has several other
issues such as the misleading of the decode key can cause a huge blunder. Thus, the
mechanism of confidentiality has been supported by the approach of Digital Certificate,
Biometric Verification and Digital token. Along with the above aspects there is a
signification responsibility of users which demands to avoid sensitive data in less protected
storage systems (Abomhara, 2015).
Document Page
2Cyber Security
Integrity:
The second aspect of the Cyber security is the data integrity which stands for the
correctness or the trustworthiness of the information resources. While comparing the aspect
of data confidentiality and integrity is has been observed that the data confidentiality is
mainly focused on the access control of those data however, the aspect of data integrity is
followed by the concept which prevent to store information from unauthorized resources. The
information sources must be credible and must have proper authentication. Thus, in order to
enhance the Cyber Security, it must provide a proper prevention from unauthorized changes
along with the access control. The cryptography checksum is used to verify the integrity of
the information resources (Hewett, Rudrapattana & Kijsanayothin, 2014, April).
Availability:
Last but one of the major aspects of cyber security is its information availability
which stands to guarantee the constant access of sensitive data by the authorized people. In
order to provide the proper availability to the stored information the mechanism of Cyber
Security obtained the faster recovery plan of connection between the sources and the user.
Along with that in order to prevent the data loss and from malicious attacks it is necessary
adopts backup plans as well as the data protection protocol (Gollmann & Krotofil, 2016).
Lastly, it can be concluded that the concept of Confidentiality, Integrity and
Availability is essential to incorporate with the mechanism of Cyber Security in order to
provide an effective protection to the sensitive information resources by analysing the
possible threats and the authorization.
Document Page
3Cyber Security
Reference:
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Gollmann, D., & Krotofil, M. (2016). Cyber-physical systems security. In The New
Codebreakers (pp. 195-204). Springer, Berlin, Heidelberg.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology
Innovation Management Review, 4(10).
Hewett, R., Rudrapattana, S., & Kijsanayothin, P. (2014, April). Cyber-security analysis of
smart grid SCADA systems with game models. In Proceedings of the 9th annual
cyber and information security research conference (pp. 109-112). ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]