Wednesday, November 14, 2018

CIA (Confidentiality, Integrity, Availability) Triangle



Major Threats and Drivers to CIA Triangle
            The threat, in the sense of information security, is an activity that is possibly dangerous to the information or operations. Drivers, on the other hand, are the activities that make it possible for the operation to be in place and meet the expectations. Confidentiality, integrity, and availability (CIA) triad has some major threats and drivers. Major threats to the CIA triad are viruses and worms, unauthorized intrusion, and denial of service (Perrin, 2008).
·         Viruses and worms: Viruses and worms from computer programs from working properly. This threatens the confidentiality, integrity, and availability of the information.
·         Unauthorized intrusion: This is accessing the computer system without the authorization of the owner. People who access computer systems are referred to as hackers. Hacking threatens the confidentiality, integrity, and availability of information stored in the system (De et al., 2014).
·         Denial of service: It is popularly known as DoS attack. However, it is not for stealing information, but it brings down the targeted network thus denying the authorized users access. This hinders on the availability of the information.
            Although there are threats to the CIA triad, there are also drivers which help in the further progress of the information. They are as follows (Sattarova, Feruza, & Kim, 2007):
·         Cryptography: This protects against access to the information by unauthorized people. Therefore, it ensures that confidentiality of the information is maintained.
·         Data hashing: This is also a type of cryptography which ensures the information sent through the systems only lands and is read by the intended people.
·         Data backup: Data backup is having an exact copy of the original data and information stored elsewhere to prevent against loss (Cherdantseva & Hilton, 2013).
References
Cherdantseva, Y., & Hilton, J. (2013, September). A reference model of information assurance &             security. In Availability, reliability and security (ares), 2013 eighth international                                           
            conference on (pp. 546-555). IEEE.
de, O. A. R., Villalba, L. J., Orozco, A. L., Buiati, F., & Kim, T. H. (January 01, 2014). A            
            layered trust information security architecture. Sensors (basel, Switzerland), 14, 12,           
            22754-72.
Perrin, C. (2008). The CIA triad.
Sattarova Feruza, Y., & Kim, T. H. (2007). IT security review: Privacy, protection, access            
            control, assurance and system security. International Journal of Multimedia and                
            Ubiquitous Engineering, 2(2), 17-31.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in non plagiarized research papers if you need a similar paper you can place your order for best custom essay site.



No comments:

Post a Comment