¶ … Confidentiality, Integrity, and Availability
In the contemporary information systems environment, the security of organizational information resources is essential given an increase of hacker incidents globally. Data confidentiality is essential to ensure that the private information is not disclosed or made available to unauthorized individuals. On the other hand, the integrity is the part of information security that ensures that program and data are exchanged only by an authorized person. The system integrity assures that the system performs its intended functions without its inadvertent manipulation. The availability assures that the systems perform its intended function, and it does not deny its availability to the authorized user. These three security concepts (Integrity, Confidentiality, and Availability) is referred as Triad that performs fundamental security objectives for organizational information systems.
The objective of this paper is to explore the three concepts of information security.
The CIA Triad
The confidentiality can only be attained when an organization is able to achieve a restriction on information disclosures and access. Moreover, confidentiality involves protecting the proprietary information to enhance the personal privacy. Moreover, the integrity involves guiding against improper destruction or modification of information to ensure the authenticity of the information. A loss of integrity can lead to the destruction of information...
Supply Chain Management Hypothesis defined Concepts of SCM and the evolution to its present day form Critical factors that affect SCM Trust Information sharing and Knowledge management Culture and Belief -- impact on SCM Global environment and Supply Chain management "Social" and "soft" parameter required for SCM Uncertainties This chapter aims to give an outline and scope of the study that will be undertaken in this work. The study lays out the issues faced by manufacturing organizations when it comes
Accounting Information Systems have emerged as very famous components of modern businesses mainly because they offer beneficial and timely information to management in addition to being cost-effective. Generally, these systems are helpful in book account payables, cash transactions, receivables, and every other accounting function in an orderly manner. The need for an effective accounting information system in an organization is attributed to the huge volume of data handled by accounting
This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying
It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now