Topic > CIA Triad

"Say no to plagiarism. Get a tailor-made essay on 'Why violent video games should not be banned'? Get an original essay Confidentiality: It is generally comparable to protection. The measures attempted to ensure confidentiality are intended to prevent sensitive data from contacting the wrong people, while ensuring that the right people can obtain it with certainty: access must be limited to those authorized to see the information referenced the information is sorted based on the amount and type of damage that should be possible if it were to fall into inadvertent hands, quite rigorous measures could then be carried out by those classes. From time to time the protection of the confidentiality of information may include unusual preparation for those who I am aware of such preparation would commonly include security risks that could weaken this data. Preparation can help acclimate approved individuals with risk factors and how to prepare for them. The easiest parts of the preparation can incorporate strong passwords, prescribed password procedures, and data on social construction strategies, to prevent them from distorting the information by adhering to the principles with high expectations and possibly heartbreaking results. A good example of strategies used to ensure confidentiality is a record number or identification number when managing an account on the web. Encryption of information is a typical technique for ensuring confidentiality. Customer IDs and passwords are a standard system; two-factor validation is becoming the standard. Different alternatives include biometric confirmation and security tokens, key combs or delicate tokens. Additionally, customers can avoid potential risks by limiting the amount of points where data appears and the circumstances under which it is actually transmitted to complete a requested trade. Further measures can be taken in case of particularly delicate archives, precautionary measures, for example, archiving only on air-gapped PCs, devices with separate capacity or, for extremely delicate data, in the form of a hard copy, so to speak. Integrity: The I in the CIA remains for integrity, especially information integrity. The way to achieve this segment of the CIA Triad is to protect information from modification or deletion by unapproved individuals and to ensure that when approved individuals make improvements that should not have been affected, the damage can be repaired. Some data should not be inappropriately changeable by any stretch of the imagination, such as customer account checks, as even a fleeting change can cause massive administrative interference and classification disruptions. Other information must be considerably more accessible for modification than such strict control would allow, for example, customer records – but should be reversible as far as reasonably conceivable if changes occurred which could subsequently be complained about (such as due to accidental deletion the incorrect documents). For situations where changes should be simple for approved employees, but resolved effortlessly, alternative control systems and more conventional reinforcements are among the best-known measures used to ensure integrity. Even conventional Unix document permissions and much more limited record consensus systems, such as the read-only document signal in MS Windows 98, can be a critical factor in individual framework measures to ensure data integrity."