blog




  • Essay / Information and the CIA Triad - 1330

    CIA Triad? Sounds like a secret organization, doesn't it? It's almost like people are going to suddenly stop in your driveway, jump out and take you away, never to be seen again. This looks very scary. Luckily for us, that won't happen. Let's get to the point. Information is defined as raw data, which includes words, numbers, values, etc. They include analytical and factual information. Safety is defined as the prevention of intentional harm. The CIA Triad is a structure of policies related to solving problems related to information security. Julius Caesar was the first to create something that could be considered information security. He invented the Caesar cipher. Unless you were supposed to see his messages, it was completely indecipherable. There are two categories within information systems: computer security and information assurance. Computer security mainly concerns any device using a processor; the system protects it from any malicious attacks such as cyber attacks. Information assurance ensures that in the event of a problem, all data is backed up and does not suffer any damage after an attack. Over the years, government, employers, etc. have obtained vast amounts of information about people around the world, and now that we are in a technological age, all of this information is stored on computers and shared over a network. Now imagine that if this information fell into the wrong hands, it would be a major disaster. As users of electronic devices, we also want to be sure to protect our privacy. If we have our financial information on our devices, we want to know that it is safe and won't be used to ruin us financially. This is the CIA Triad coming into play. The CIA defends information from the bottom of the paper......and from all possibilities. We review each pros and cons. The grid is divided into a 2x2 template with four templates each with the SWOT acronyms as headers. Strengths Weaknesses No unauthorized access hacking Allow access to those who need it Opportunities Threats Allow access to those who need to hack it and allow people to choose who phishing can access Our security systems information seems to be safe at the moment and hopefully we can keep it as is, with a little more improvement. Work CitedCryptography 101 with SSL. InfoSec Institute. 2013. http://resources.infosecinstitute.com/cryptography-101-with-ssl/ Gibson, Darril. Understand the security triad (confidentiality, integrity and availability). Pearson IT certification. 2011. http://www.pearsonitcertification.com/articles/article.aspx?p=1708668