Article1:The fundamental concepts of security are confidential, integrity and availability which are known as CIA triad. Security measures are taken to protect these secure fundamentals.Confidentiality – is about protecting data from disclosure to unauthorized users. Information is so valuable that it needs to be taking care, considering an example of bank accounts, credit card information, valuable government information, etc. In such cases, only Encryption plays a prominent role to secure the information. With encryption, no one can read the key except the machine. Encryption is a process of generating random alphanumeric characters which can be decrypted by a machine. While using internet SSL/TLS are the protocols used to ensure security.Integrity – The integrity of information refers to protecting information from being modified by unauthorized parties (Chia, 2012). Being said that what if the information is being corrupted? During Sep 2016, Wells Fargo employee (developer) created fake millions of accounts to juice bank’s books. If information is not consistent while transit then there can be serious issues. This can be avoided by implementing checksums, cryptography or electromagnetic pulse for validating integrity.Availability – Availability of information refers to ensuring that authorized parties are able to access the information when needed (Chia, 2012). Important information should be accessed by the right individual. What if some valuable information is accessed by unauthorized users? – it can cause some damage. There authentication and authorization are the crucial elements to protect information. What if that valuable information is available to hackers? Or what if some valuable data is lost with server crash? So upgrading systems, creating a data recovery plan, backup, etc can prevent from data loss. Investing in firewalls setup and proxy servers can guard against denial of service attacks.Article-2:Confidentiality: In this step only the authorized will be able to access the data. Unauthorized people won’t be able to access our data. Example while working in a IT industry even though we are part of a huge team you will be able to see only the data on the module which we are working. In order to view documents or folders belonging to other teams , you won’t have access to them. In order to view the data we need to request access and provide the justification. Then only you will be able to access them depending on the need.Depending on the people who are receiving our data, the severity will be increased.Depending on the access of information to the undisclosed recipients and the extent they use our data it will adversely impact the organization or individual.Integrity:Once the data is accessed by the unauthorized persons they can tamper the data to the extent they need. This will have adverse effects depending on the situation. In some crucial cases this tampering or destruction can lead to difficult situations. They were so many instances due to this many personal and organizations have been affected.Availability:In wireless communication if the information is available to any third parties or agencies the Nation security will be at risk. This impact can be on any field like military , banks and armed forces. So always the data should be protected and only the right people should have access to the data.By applying the CIA principles the confidentiality, Integrity and the availability are secured. Information security can provide unauthorized users of not accessing the data . Therefore the data is not modified and the authenticity of the data can be kept.
We offer the best custom paper writing services. We have done this question before, we can also do it for you.
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How It Works
- Click on the “Place Your Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.