SlideShare a Scribd company logo
1 of 3
Download to read offline
CIA = Confidentiality of information, Integrity of information, Availability of information.
This model is designed to guide policies for information security in organization.Each field is
seperately identified and respective protective measures are listed.Any breach in anyof the three
fields will cause serious consequences to the parties involved.
Confidentiality:
Confidentiality can be called privacy.In todays world everyone has sensitive information which
can be a problem if fell into wrong hands. Only the authorized person must be able to view the
data while restricting the third parties to share the information.It is not much difficult to acheive
this but one problem is to be considered. If we allow tough measures the original trusted user
might face difficulties to view his information. so the rules should be friendly for the approriate
verified user as well.
Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of
data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is
being used. But addition to that there are biometric verifications,storing on truecrypt
volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe
commuication across network),etc
Integrity:.
Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life
cycle. Information is only worth if its true and there are many attackers in the net who change the
details of a secured file so that it looses its value.
measures which can develop integrity are using file permissions and user access
controls,digitally signing the data, hashing the data and sending it to the receiver to compare it
with the received information using cryptography,using checksums or crptographic checksums.
There should also be a facility to repair the damaged information by using strong and secure
backup mechanism.
Availability:
This ensures that the user can get his/her information whenever he needs it. The main aim of
security is to safeguared the authorized user's data and ensure that he gets his data at all times is
crucial. some attacks mainly focusses on denying the user his access.this type of attacks are
DDOS attacks.Some parties might try to block some company's resources to the users so that
they can have more sales.Not only attackers natural disasters also might cause losing the data and
denying the user his right to get his data when needed.
The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency
for high important information can also help.
Solution
CIA = Confidentiality of information, Integrity of information, Availability of information.
This model is designed to guide policies for information security in organization.Each field is
seperately identified and respective protective measures are listed.Any breach in anyof the three
fields will cause serious consequences to the parties involved.
Confidentiality:
Confidentiality can be called privacy.In todays world everyone has sensitive information which
can be a problem if fell into wrong hands. Only the authorized person must be able to view the
data while restricting the third parties to share the information.It is not much difficult to acheive
this but one problem is to be considered. If we allow tough measures the original trusted user
might face difficulties to view his information. so the rules should be friendly for the approriate
verified user as well.
Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of
data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is
being used. But addition to that there are biometric verifications,storing on truecrypt
volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe
commuication across network),etc
Integrity:.
Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life
cycle. Information is only worth if its true and there are many attackers in the net who change the
details of a secured file so that it looses its value.
measures which can develop integrity are using file permissions and user access
controls,digitally signing the data, hashing the data and sending it to the receiver to compare it
with the received information using cryptography,using checksums or crptographic checksums.
There should also be a facility to repair the damaged information by using strong and secure
backup mechanism.
Availability:
This ensures that the user can get his/her information whenever he needs it. The main aim of
security is to safeguared the authorized user's data and ensure that he gets his data at all times is
crucial. some attacks mainly focusses on denying the user his access.this type of attacks are
DDOS attacks.Some parties might try to block some company's resources to the users so that
they can have more sales.Not only attackers natural disasters also might cause losing the data and
denying the user his right to get his data when needed.
The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency
for high important information can also help.

More Related Content

Similar to CIA = Confidentiality of information, Integrity of information, Avai.pdf

Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfEnterprise Insider
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40Ulf Mattsson
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Information security principles
Information security principlesInformation security principles
Information security principlesDan Morrill
 
This is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdfThis is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdfJUSTSTYLISH3B2MOHALI
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxtodd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxhealdkathaleen
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 

Similar to CIA = Confidentiality of information, Integrity of information, Avai.pdf (20)

Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Data security
Data securityData security
Data security
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Information security
Information securityInformation security
Information security
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
This is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdfThis is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdf
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
I0516064
I0516064I0516064
I0516064
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 

More from annaielectronicsvill

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdfannaielectronicsvill
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdfannaielectronicsvill
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdfannaielectronicsvill
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdfannaielectronicsvill
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfannaielectronicsvill
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdfannaielectronicsvill
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfannaielectronicsvill
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfannaielectronicsvill
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfannaielectronicsvill
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfannaielectronicsvill
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfannaielectronicsvill
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfannaielectronicsvill
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfannaielectronicsvill
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfannaielectronicsvill
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfannaielectronicsvill
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfannaielectronicsvill
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfannaielectronicsvill
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfannaielectronicsvill
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfannaielectronicsvill
 

More from annaielectronicsvill (20)

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdf
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdf
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdf
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdf
 
e) Te S Solution e) Te.pdf
                     e) Te  S  Solution                     e) Te.pdf                     e) Te  S  Solution                     e) Te.pdf
e) Te S Solution e) Te.pdf
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdf
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdf
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdf
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdf
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdf
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdf
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdf
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

CIA = Confidentiality of information, Integrity of information, Avai.pdf

  • 1. CIA = Confidentiality of information, Integrity of information, Availability of information. This model is designed to guide policies for information security in organization.Each field is seperately identified and respective protective measures are listed.Any breach in anyof the three fields will cause serious consequences to the parties involved. Confidentiality: Confidentiality can be called privacy.In todays world everyone has sensitive information which can be a problem if fell into wrong hands. Only the authorized person must be able to view the data while restricting the third parties to share the information.It is not much difficult to acheive this but one problem is to be considered. If we allow tough measures the original trusted user might face difficulties to view his information. so the rules should be friendly for the approriate verified user as well. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is being used. But addition to that there are biometric verifications,storing on truecrypt volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe commuication across network),etc Integrity:. Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life cycle. Information is only worth if its true and there are many attackers in the net who change the details of a secured file so that it looses its value. measures which can develop integrity are using file permissions and user access controls,digitally signing the data, hashing the data and sending it to the receiver to compare it with the received information using cryptography,using checksums or crptographic checksums. There should also be a facility to repair the damaged information by using strong and secure backup mechanism. Availability: This ensures that the user can get his/her information whenever he needs it. The main aim of security is to safeguared the authorized user's data and ensure that he gets his data at all times is crucial. some attacks mainly focusses on denying the user his access.this type of attacks are DDOS attacks.Some parties might try to block some company's resources to the users so that they can have more sales.Not only attackers natural disasters also might cause losing the data and denying the user his right to get his data when needed. The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency for high important information can also help.
  • 2. Solution CIA = Confidentiality of information, Integrity of information, Availability of information. This model is designed to guide policies for information security in organization.Each field is seperately identified and respective protective measures are listed.Any breach in anyof the three fields will cause serious consequences to the parties involved. Confidentiality: Confidentiality can be called privacy.In todays world everyone has sensitive information which can be a problem if fell into wrong hands. Only the authorized person must be able to view the data while restricting the third parties to share the information.It is not much difficult to acheive this but one problem is to be considered. If we allow tough measures the original trusted user might face difficulties to view his information. so the rules should be friendly for the approriate verified user as well. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is being used. But addition to that there are biometric verifications,storing on truecrypt volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe commuication across network),etc Integrity:. Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life cycle. Information is only worth if its true and there are many attackers in the net who change the details of a secured file so that it looses its value. measures which can develop integrity are using file permissions and user access controls,digitally signing the data, hashing the data and sending it to the receiver to compare it with the received information using cryptography,using checksums or crptographic checksums. There should also be a facility to repair the damaged information by using strong and secure backup mechanism. Availability: This ensures that the user can get his/her information whenever he needs it. The main aim of security is to safeguared the authorized user's data and ensure that he gets his data at all times is crucial. some attacks mainly focusses on denying the user his access.this type of attacks are DDOS attacks.Some parties might try to block some company's resources to the users so that they can have more sales.Not only attackers natural disasters also might cause losing the data and denying the user his right to get his data when needed. The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
  • 3. and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency for high important information can also help.