Verified Document

Concepts Of Availability Integrity And Confidentiality Essay

¶ … Confidentiality, Integrity, and Availability In the contemporary information systems environment, the security of organizational information resources is essential given an increase of hacker incidents globally. Data confidentiality is essential to ensure that the private information is not disclosed or made available to unauthorized individuals. On the other hand, the integrity is the part of information security that ensures that program and data are exchanged only by an authorized person. The system integrity assures that the system performs its intended functions without its inadvertent manipulation. The availability assures that the systems perform its intended function, and it does not deny its availability to the authorized user. These three security concepts (Integrity, Confidentiality, and Availability) is referred as Triad that performs fundamental security objectives for organizational information systems.

The objective of this paper is to explore the three concepts of information security.

The CIA Triad

The confidentiality can only be attained when an organization is able to achieve a restriction on information disclosures and access. Moreover, confidentiality involves protecting the proprietary information to enhance the personal privacy. Moreover, the integrity involves guiding against improper destruction or modification of information to ensure the authenticity of the information. A loss of integrity can lead to the destruction of information...

Additionally, the concept availability ensures a reliable and timely access to the use of information, and a loss of availability can lead to a destruction of the organizational information infrastructures. (Kim, & Solomon, 2014).
An example of confidentiality is the privacy of the student's grade information. In the United States, the student grade information is an asset and its confidentiality is very important to the student. The law regulates a release of such information to the public, and the regulation stipulates that the information should only be released to the students, employees, or parent. Moreover, organizations are required to protect the employee and customer's data from unauthorized access. In the United States, the sensitive data of several companies have been compromised by the hackers and sensitive data have been stolen eroding the concept of integrity, confidentiality and availability accorded to the data.

Seven Domains IT Infrastructures

A protection of the IT infrastructures is very critical to enhancing availability, integrity and availability of the data. The seven domains of IT infrastructures as follows:

1. User domain

2. Workstation Domain

3. LAN Domain

4. LAN-to-WAN Domain

5. Remote Access Domain

6. WAN Domain, and

7. System/Application Domain.

User domain covers all users and people having the privileges to access…

Sources used in this document:
Reference

Kim, D., & Solomon, M. G. (2014). Fundamentals of information systems security (2nd Ed.). Burlington, MA: Jones & Bartlett Learning.
Cite this Document:
Copy Bibliography Citation

Related Documents

Supply Chain Management Hypothesis Defined Concepts of
Words: 24788 Length: 80 Document Type: Thesis

Supply Chain Management Hypothesis defined Concepts of SCM and the evolution to its present day form Critical factors that affect SCM Trust Information sharing and Knowledge management Culture and Belief -- impact on SCM Global environment and Supply Chain management "Social" and "soft" parameter required for SCM Uncertainties This chapter aims to give an outline and scope of the study that will be undertaken in this work. The study lays out the issues faced by manufacturing organizations when it comes

Accounting Information Systems Have Emerged As Very
Words: 1563 Length: 5 Document Type: Essay

Accounting Information Systems have emerged as very famous components of modern businesses mainly because they offer beneficial and timely information to management in addition to being cost-effective. Generally, these systems are helpful in book account payables, cash transactions, receivables, and every other accounting function in an orderly manner. The need for an effective accounting information system in an organization is attributed to the huge volume of data handled by accounting

Invention of the Internet Has
Words: 6685 Length: 20 Document Type: Capstone Project

This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying

Cloud Computing and Data Security
Words: 5196 Length: 18 Document Type: Term Paper

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now