Saturday, May 23, 2020

Relationship Between Info Sec And Cia Model - 1437 Words

The answer discusses the following: 1) Relationship between Info Sec and CIA model. (What is a CIA model). 2) Introduction to the 3 principles. Relationship between the three principles 3) Ways to ensure CIA 4) Confidentiality with Policy, Technology and Education. Two examples with how confidentiality is lost with policy and technology on Storage/Processing/Transmission aspects. The practice of defending digital information from unauthorized Access, Use, Recording, Disruption, Modification and Destruction is Information Security. There comes a question as to how do we start building or evaluating a security system. The answer is CNSS model or McCumbers cube (Committee on National Security Systems). The cube is an elaborate model for†¦show more content†¦Whenever an unauthorized individual or a party can view information, confidentiality is breached. Integrity: Integrity deals with maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in the transition period, and steps must be taken to ensure that data is not altered by unauthorized people. Availability: Informational availability is that the information should be made available for the right people at the right time. If an attacker can bring down a service for a period, it affects the access of information to the required people. Relationship between the three principles: Whenever an unauthorized individual can access the information, its confidentiality is lost. The person is likely to alter the information according to his needs, along with which the integrity of the information is lost. The person may try to restrict the user from the accessing the information either by bringing down the service for a period or modifying the information in such a way that the originality is lost, here the availability is lost. This is how the three principles are integrated. There are certain ways to ensure Confidentiality, Integrity and Availability which is discussed below: Confidentiality: There are some of the methods that ensure that confidentiality is not disturbed. For example - Cryptography and EncryptionShow MoreRelatedNational Security Outline Essay40741 Words   |  163 Pages36 Chapter 14: Measures to Reduce Tensions and Prevent War 41 CHAPTER 16: The Law of the Sea 43 CHAPTER 17: The Constitutional Framework for the Division of Nat’l Security Powers Between Congress, the President and the Court 48 The 1973 War Powers Resolution 49 II. The War Powers Resolution: A Debate between JNM and Frederick Tipson 50 CHAPTER 18: The National Security Process 60 CHAPTER 19: intelligence and Counterintelligence 63 CHAPTER 20: Access to Information 65 CHAPTER 21: FreedomRead MoreChipotle18199 Words   |  73 Pagesborrowed $85,000 from his father (structured as part loan and part equity investment) to open his first Chipotle, that served a limited menu of tacos and burritos (Ells, 2007). Ells applied the combined training and techniques he learned at the CIA and as sous-chef to perfect the food he served. He determined to have a different type of fast-food restaurant; he was emphatic about his belief that only the highest quality ingredients were included in the burritos and tacos he served. Chipotle’sRead MoreCissp Study Guide67657 Words   |  271 PagesAvailability can be defined as: lTe sts Explanation: There are several small and large objectives of a security program, but the main three principles in all programs are confidentiality, integrity, and availability. These are referred to as the CIA triad. Shon Harris All-in-one CISSP Certification Guide pg 62 .co m Answer: C ISC CISSP: Practice Exam C. ) The Technical communications and Network Security domain D. ) The Telnet and Security domain Answer: A Explanation: The TelecommunicationsRead MoreAccounting Information System Chapter 1137115 Words   |  549 PagesCHAPTER 1 ACCOUNTING INFORMATION SYSTEMS: AN OVERVIEW SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 1.1 The value of information is the difference between the benefits realized from using that information and the costs of producing it. Would you, or any organization, ever produce information if its expected costs exceeded its benefits? If so, provide some examples. If not, why not? Most organizations produce information only if its value exceeds its cost. However, there are two situationsRead MoreRed Hat Enterprise Linux 6 Security Guide50668 Words   |  203 Pagescan calculate aspects such as data integrity and high-availability (HA) as part of their planning and process management costs. In some industries, such as electronic commerce, the availability and trustworthiness of data can mean the difference between success and failure. 1.1.1.1. How did Computer Security come about? Information security has evolved over the years due to the increasing reliance on public networks not to disclose personal, financial, and other restricted information. T here are

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.