SlideShare a Scribd company logo
CIA = Confidentiality of information, Integrity of information, Availability of information.
This model is designed to guide policies for information security in organization.Each field is
seperately identified and respective protective measures are listed.Any breach in anyof the three
fields will cause serious consequences to the parties involved.
Confidentiality:
Confidentiality can be called privacy.In todays world everyone has sensitive information which
can be a problem if fell into wrong hands. Only the authorized person must be able to view the
data while restricting the third parties to share the information.It is not much difficult to acheive
this but one problem is to be considered. If we allow tough measures the original trusted user
might face difficulties to view his information. so the rules should be friendly for the approriate
verified user as well.
Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of
data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is
being used. But addition to that there are biometric verifications,storing on truecrypt
volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe
commuication across network),etc
Integrity:.
Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life
cycle. Information is only worth if its true and there are many attackers in the net who change the
details of a secured file so that it looses its value.
measures which can develop integrity are using file permissions and user access
controls,digitally signing the data, hashing the data and sending it to the receiver to compare it
with the received information using cryptography,using checksums or crptographic checksums.
There should also be a facility to repair the damaged information by using strong and secure
backup mechanism.
Availability:
This ensures that the user can get his/her information whenever he needs it. The main aim of
security is to safeguared the authorized user's data and ensure that he gets his data at all times is
crucial. some attacks mainly focusses on denying the user his access.this type of attacks are
DDOS attacks.Some parties might try to block some company's resources to the users so that
they can have more sales.Not only attackers natural disasters also might cause losing the data and
denying the user his right to get his data when needed.
The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency
for high important information can also help.
Solution
CIA = Confidentiality of information, Integrity of information, Availability of information.
This model is designed to guide policies for information security in organization.Each field is
seperately identified and respective protective measures are listed.Any breach in anyof the three
fields will cause serious consequences to the parties involved.
Confidentiality:
Confidentiality can be called privacy.In todays world everyone has sensitive information which
can be a problem if fell into wrong hands. Only the authorized person must be able to view the
data while restricting the third parties to share the information.It is not much difficult to acheive
this but one problem is to be considered. If we allow tough measures the original trusted user
might face difficulties to view his information. so the rules should be friendly for the approriate
verified user as well.
Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of
data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is
being used. But addition to that there are biometric verifications,storing on truecrypt
volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe
commuication across network),etc
Integrity:.
Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life
cycle. Information is only worth if its true and there are many attackers in the net who change the
details of a secured file so that it looses its value.
measures which can develop integrity are using file permissions and user access
controls,digitally signing the data, hashing the data and sending it to the receiver to compare it
with the received information using cryptography,using checksums or crptographic checksums.
There should also be a facility to repair the damaged information by using strong and secure
backup mechanism.
Availability:
This ensures that the user can get his/her information whenever he needs it. The main aim of
security is to safeguared the authorized user's data and ensure that he gets his data at all times is
crucial. some attacks mainly focusses on denying the user his access.this type of attacks are
DDOS attacks.Some parties might try to block some company's resources to the users so that
they can have more sales.Not only attackers natural disasters also might cause losing the data and
denying the user his right to get his data when needed.
The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency
for high important information can also help.

More Related Content

Similar to CIA = Confidentiality of information, Integrity of information, Avai.pdf

Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Enterprise Insider
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Ulf Mattsson
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
rahulbhardwaj312501
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
todd271
 
Information security
Information securityInformation security
Information security
Onkar Sule
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
Information security principles
Information security principlesInformation security principles
Information security principles
Dan Morrill
 
This is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdfThis is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdf
JUSTSTYLISH3B2MOHALI
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
Scode Network Institute
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
Scode Network Institute
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 

Similar to CIA = Confidentiality of information, Integrity of information, Avai.pdf (20)

Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Data security
Data securityData security
Data security
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Information security
Information securityInformation security
Information security
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
This is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdfThis is a three part question. For each part the answer requires ide.pdf
This is a three part question. For each part the answer requires ide.pdf
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
I0516064
I0516064I0516064
I0516064
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 

More from annaielectronicsvill

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf
annaielectronicsvill
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdf
annaielectronicsvill
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdf
annaielectronicsvill
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdf
annaielectronicsvill
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdf
annaielectronicsvill
 
e) Te S Solution e) Te.pdf
                     e) Te  S  Solution                     e) Te.pdf                     e) Te  S  Solution                     e) Te.pdf
e) Te S Solution e) Te.pdf
annaielectronicsvill
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
annaielectronicsvill
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdf
annaielectronicsvill
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdf
annaielectronicsvill
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
annaielectronicsvill
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdf
annaielectronicsvill
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
annaielectronicsvill
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
annaielectronicsvill
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
annaielectronicsvill
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
annaielectronicsvill
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdf
annaielectronicsvill
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdf
annaielectronicsvill
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
annaielectronicsvill
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdf
annaielectronicsvill
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdf
annaielectronicsvill
 

More from annaielectronicsvill (20)

1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf1) Now we consider that the product is lawnmower. Validation tests i.pdf
1) Now we consider that the product is lawnmower. Validation tests i.pdf
 
The alcohol generally have the higher boiling poi.pdf
                     The alcohol generally have the higher boiling poi.pdf                     The alcohol generally have the higher boiling poi.pdf
The alcohol generally have the higher boiling poi.pdf
 
Square planar..Lone pairs will be on axial plane..pdf
                     Square planar..Lone pairs will be on axial plane..pdf                     Square planar..Lone pairs will be on axial plane..pdf
Square planar..Lone pairs will be on axial plane..pdf
 
For water molecule, all modes of vibrations wolud.pdf
                     For water molecule, all modes of vibrations wolud.pdf                     For water molecule, all modes of vibrations wolud.pdf
For water molecule, all modes of vibrations wolud.pdf
 
What do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdfWhat do the fields of cosmology, financial matters, fund, law, scien.pdf
What do the fields of cosmology, financial matters, fund, law, scien.pdf
 
e) Te S Solution e) Te.pdf
                     e) Te  S  Solution                     e) Te.pdf                     e) Te  S  Solution                     e) Te.pdf
e) Te S Solution e) Te.pdf
 
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
view sourceprint01  #includefstreamSolutionview sourceprint.pdfview sourceprint01  #includefstreamSolutionview sourceprint.pdf
view sourceprint01 #includefstreamSolutionview sourceprint.pdf
 
These antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdfThese antibodies could be acquired by;1. Infection by measles viru.pdf
These antibodies could be acquired by;1. Infection by measles viru.pdf
 
There are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdfThere are many theories regarding extinction of H Neanderthals. The .pdf
There are many theories regarding extinction of H Neanderthals. The .pdf
 
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdfthe three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
the three Worm Nobel Prizes mentioned by Martin Chalfie in his n.pdf
 
The principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdfThe principle of Heliscope sequencer is based on single molecule seq.pdf
The principle of Heliscope sequencer is based on single molecule seq.pdf
 
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdfThe excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
The excess sodium ethoxide is decomposed into sodium hydroxide and e.pdf
 
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdfThis value belongs to PPPoE session stage protocol..PPPoE is point.pdf
This value belongs to PPPoE session stage protocol..PPPoE is point.pdf
 
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdfThe RASopathy diseases include-SolutionThe RASopathy diseases .pdf
The RASopathy diseases include-SolutionThe RASopathy diseases .pdf
 
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdfPhotosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
Photosynthesis - converts carbon dioxide to sugarsCell cycle - con.pdf
 
public class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdfpublic class Hello {public static void main(String[] args) { P.pdf
public class Hello {public static void main(String[] args) { P.pdf
 
Please follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdfPlease follow the cod eand comments for description CODE #incl.pdf
Please follow the cod eand comments for description CODE #incl.pdf
 
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdfMolar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
Molar mass of NO2 = molar mass of N + 2 x molar mass of O= 14.01 +.pdf
 
Milgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdfMilgram experiment was conducted to demonstrate the effect that figu.pdf
Milgram experiment was conducted to demonstrate the effect that figu.pdf
 
Infrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdfInfrastructure may be owned and managed by governments or by private.pdf
Infrastructure may be owned and managed by governments or by private.pdf
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

CIA = Confidentiality of information, Integrity of information, Avai.pdf

  • 1. CIA = Confidentiality of information, Integrity of information, Availability of information. This model is designed to guide policies for information security in organization.Each field is seperately identified and respective protective measures are listed.Any breach in anyof the three fields will cause serious consequences to the parties involved. Confidentiality: Confidentiality can be called privacy.In todays world everyone has sensitive information which can be a problem if fell into wrong hands. Only the authorized person must be able to view the data while restricting the third parties to share the information.It is not much difficult to acheive this but one problem is to be considered. If we allow tough measures the original trusted user might face difficulties to view his information. so the rules should be friendly for the approriate verified user as well. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is being used. But addition to that there are biometric verifications,storing on truecrypt volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe commuication across network),etc Integrity:. Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life cycle. Information is only worth if its true and there are many attackers in the net who change the details of a secured file so that it looses its value. measures which can develop integrity are using file permissions and user access controls,digitally signing the data, hashing the data and sending it to the receiver to compare it with the received information using cryptography,using checksums or crptographic checksums. There should also be a facility to repair the damaged information by using strong and secure backup mechanism. Availability: This ensures that the user can get his/her information whenever he needs it. The main aim of security is to safeguared the authorized user's data and ensure that he gets his data at all times is crucial. some attacks mainly focusses on denying the user his access.this type of attacks are DDOS attacks.Some parties might try to block some company's resources to the users so that they can have more sales.Not only attackers natural disasters also might cause losing the data and denying the user his right to get his data when needed. The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency for high important information can also help.
  • 2. Solution CIA = Confidentiality of information, Integrity of information, Availability of information. This model is designed to guide policies for information security in organization.Each field is seperately identified and respective protective measures are listed.Any breach in anyof the three fields will cause serious consequences to the parties involved. Confidentiality: Confidentiality can be called privacy.In todays world everyone has sensitive information which can be a problem if fell into wrong hands. Only the authorized person must be able to view the data while restricting the third parties to share the information.It is not much difficult to acheive this but one problem is to be considered. If we allow tough measures the original trusted user might face difficulties to view his information. so the rules should be friendly for the approriate verified user as well. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data trasferred from one computer to another. Nowadays passwords and 2 factor authentication is being used. But addition to that there are biometric verifications,storing on truecrypt volumes,honey pots to divert intrusion attacks,security tokens,soft tokens,SSL/TLS ( for safe commuication across network),etc Integrity:. Integrity involves maintaining consistency,accuracy,trustworthiness of data over its entire life cycle. Information is only worth if its true and there are many attackers in the net who change the details of a secured file so that it looses its value. measures which can develop integrity are using file permissions and user access controls,digitally signing the data, hashing the data and sending it to the receiver to compare it with the received information using cryptography,using checksums or crptographic checksums. There should also be a facility to repair the damaged information by using strong and secure backup mechanism. Availability: This ensures that the user can get his/her information whenever he needs it. The main aim of security is to safeguared the authorized user's data and ensure that he gets his data at all times is crucial. some attacks mainly focusses on denying the user his access.this type of attacks are DDOS attacks.Some parties might try to block some company's resources to the users so that they can have more sales.Not only attackers natural disasters also might cause losing the data and denying the user his right to get his data when needed. The best solution is using offsite backups and ensuring the downtime to retreive is less.firewalls
  • 3. and proxies can help the tackling of dos attacks (denial of service attacks), allowing redundency for high important information can also help.