CIA triad? Sounds like a secret organization, right? It almost feels like people will pull up abruptly in your driveway, jump out, and carry you away, never to be seen again. It looks very scary. It's good for us that it doesn't happen. Let's get to the point. Information is defined as raw data, which includes words, numbers, values, etc. Includes analytical and factual information. Security is defined as the prevention of intentional harm. The CIA Triad is a framework of policies related to solving information security problems. Julius Caesar was the first to create something that could be considered cybersecurity. He invented the Caesar code. Unless you were meant to see his messages, they were totally indecipherable. There are two categories within information systems: IT security and information assurance. Cyber security primarily concerns any device that uses a processor; the system protects it from any malicious attacks such as cyber attacks. Information Assurance ensures that if something goes wrong, all your data is backed up and not damaged after an attack. Over the years the government, employers, etc. they have obtained vast amounts of information about people all over the world and now, since we are in the technological age, all this information is stored on computers and shared across a network. Now imagine that if this information fell into the wrong hands, it would be a major catastrophe. As users of electronic devices, we want to make sure we protect our privacy too. If we have our financial information on our devices, we want to make sure that it is safe and will not be used to ruin us financially. This is the CIA Triad coming into play. The CIA defends information from au... middle of paper... from every possibility. You go through every pros and cons. The grid is divided into a 2x2 template with four templates with each of the SWOT acronyms as headers. Strengths Weaknesses No unauthorized access to hack Allow access to those who need it Opportunities Threats Allow access to those who need to hack it and allow people to choose who can access it via phishing Our information systems they seem to be safe for now and we hope to be able to keep it as it is, with some further improvements. Work CitedCryptography 101 with SSL. InfoSec Institute. 2013. http://resources.infosecinstitute.com/cryptography-101-with-ssl/Gibson, Darril. Understand the security triad (confidentiality, integrity and availability). Pearson IT certification. 2011. http://www.pearsonitcertification.com/articles/article.aspx?p=1708668
tags