Free Essay

Aic Triad

In:

Submitted By princeameer4
Words 1508
Pages 7
Introduction
The AIC triad is one of the many approaches to secure networks in today's complex computing environments. What makes the AIC triad different from any other theory is that when it is used properly it forms the cornerstone of every aspect of computing and network security. Most IT security practices are focused on protecting systems from loss of confidentiality, loss of integrity, and loss of availability; these three together are referred to as the security triad, the CIA triad, and the AIC triad. Regardless of the order in which the letters are organized in the acronym, they refer to the same principles. Confidentiality, Integrity and Availability are the cornerstones to which a network is comprised. Each with its own independent yet very important role in networking. Confidentiality refers to access control and ensures that it is restricted to the individuals who have been previously authorized to access a network or one of its resources. Integrity addresses the validity of data and any networked object. It ensures that the unauthorized changes to the data or object is noticed so that appropriate actions can be taken. Availability’s meaning is essentially as simple as the word itself. It refers to the principle that addresses the need for an authorized user to have access to a resource as quickly as possible based off the networks functioning abilities.
Availability
In an information technology (IT) environment availability is one of the most important aspects. Each type of networked environment requires a different level of availability. A great example would be www.amazon.com or any online university. These types of organizations require a different level of availability because every minute of downtime affects their ability to provide the very feature that their type of business is comprised of. In a networked environment where a regular user logs on to conduct business in a corporate environment, availability plays an important role. If a user is unable to log on to a network, they are unable to perform their job. This type of loss could potentially cost an organization a tremendous amount of money because of their loss of man-hours and production. This is why the role of Availability it critical in the AIC/CIA triad. Network resources must be available whenever an authorized user attempts to access them. Access control plays a large part in availability because security can also impact availability. As a network administrator it is important to address this issue. Resources should never be unavailable to authorized users because of security protocols or inappropriately configured access controls. It is also important to carefully consider the method and complexity of access. This is important because the more complex the access method, the more likely users will have multiple issues accessing it.
Integrity
Integrity plays a vital role in the security of a network. What integrity means in a networked environment is that data has not changed from the state that it was last known to be. One of the more popular methods used to verify the integrity of data is called hashing. According to Gibson, (2011) “a hash is a number and a hashing algorithm can calculate a hash for a file or string of data; As long as the data has not changed (and the same hashing algorithm is used), the hash will always be the same.” (P.1) Hashing is a widely used technique that utilizes an algorithm to verify data integrity. There are numerous algorithms that perform this function. Some of the more common algorithms include: Message Digest Algorithm (MD5) series, Secure Hash Algorithm (SHA) series, HAVAL, RIPEMD, Tiger, MAC and HMAC. The MD series of algorithms are cryptographic algorithms that were developed by Ron Rivest several years ago. (Haines, 2012) Over the years there have several versions that have developed. MD2, MD4 and MD5 are the three versions that are included in the MD series of cryptographic algorithms. Secure Hash Algorithms are very secure algorithms that are very much like the MD5 series. In many ways they are more secure than the MD5 series because they produce larger cryptographic hashes. Where MD5 algorithms output a fixed 128 bit message digest, SHA are capable of outputting 160 bit message digest. The more bits that the algorithm is capable of outputting, the more secure the algorithm is. This means that it is much harder to change data without it being detected. Data integrity is not only important in enterprise networking but also in everyday home use as well. Hashing is great for protection against man in the middle attacks. A man in the middle attack occurs when data is intercepted by an unintended individual or device and altered prior to reaching its originally intended destination. Everyday computer and Internet users can really take advantage of this technology when downloading software or data from the web. Many online locations now provide the hash value along with the data or program that you are intending to download. This is provided to you so that after you have downloaded the file, you can then check its integrity using a hash algorithm. Once you have done this you compare the value you have against the one provided by the source. The values should be the same. Integrity is very important when it comes to security and it is one of the many aspects that must be included in any security plan.
Confidentiality
Confidentiality is the core reason behind all IT security. The word confidentiality is somewhat synonymous with security and its meaning. In a home environment a user is responsible for keeping their personal data and information private and confidential from the rest of the world. This becomes more difficult when end users utilize the Internet. This opens them up for a multitude of attacks and leaves their systems and data extremely vulnerable. In a networked environment it is the job of the IT department and IT security professionals to keep the resources and data safe and secure from unauthorized use. There are several tools that can be used in both personal and enterprise network environments to keep information secure and confidential. Encryption, firewalls, policies, Honeypots, Intrusion Preventions Systems and Intrusion Detection Systems are some of the many tools that that are commonly used to protect information. Encryption is a very useful tool to help keep data and information confidential from unwanted viewers. Encryption uses a coding process that requires keys to decode the information once it has been encoded. The two most common types of encryption are public key encryption and symmetric key encryption. Live data and data at rest both use encryption to help facilitate this process. Live data is data that is being transmitted via some form of transmission medium. One common method of securing live data that is sensitive is called tunneling. During tunneling the data is encapsulated and uses encapsulated security protocol (ESP) to encrypt the payload of the packets sent. Once encrypted it is decrypted at the distant end. This is a very popular form of securing live data. Data at rest also uses encryption. One of the types of encryption used in this scenario is drive level encryption. Some of the more common and popular programs that offer this type of encryption is “Data Armor” and “Bit Locker”. These programs are able to protect entire hard drives from unauthorized individuals. Firewalls are used to keep networks confidential from the rest of the world. They often come in the form of a router and control the traffic in to, out of and within a network. This not only protects data from individuals outside of a network but can also segment network traffic which keeps related traffic together. This helps to eliminate spillage which can cause data to be viewed by unauthorized individuals.

Conclusion The CIA triad addresses three very important aspects of IT security. They provided a baseline structure for IT professionals to use as a guide to ensure that the basic security needs are addressed. Each of these areas are critical and must be carefully configured to balance security and functionality of the network. IT professionals should be reminded that too much security is as bad as or worse than too little. Regardless of the order in which the letters are organized in the acronym, they refer to the same principles; confidentiality, Integrity and Availability are the cornerstones to which a network is comprised. Overall, the theories of confidentiality, integrity and availability are very useful tools that can help set the base for a very secure network environment.

References

Charles, K. (2012) Security Orb: Confidentiality Integrity Availability (CIA) Triad. Retrieved from http://www.securityorb.com/2012/06/confidentiality-integrity-availability-cia-triad/
Gibson, D. (2011) Pearson IT Certification: Understanding the Security Triad. Retrieved from http://www.pearsonitcertification.com/articles/article.aspx?p=1708668
Haines, B. (2012) John Wiley & Sons, Inc., CompTIA Advanced Security Practitioner
INFOSEC. (2010). ISS SCHOOL: The AIC Triad (CIA TRIAD) Retrieved from http://www.infosecschool.com/aic-triad_cia-triad/
Stewart, J. (2011) Wiley Publishing, Inc. Certified Information Systems Security Professional: Fifth Edition. Chapter 1

Similar Documents

Premium Essay

Crisis

...events, especially for better or for worse, is determined; turning point (crisis, n.d.). A crisis can hit a company anytime and it does not discriminate because of size or notoriety. The best thing a company should have is a plan of action prepared in an advance, a crisis management plan. The Triad Group apparently did not have a crisis management plan in place as the problems started to sneak up, the company felt pressured and fell apart. According to Rick Amme, who heads the crisis and media relations firm Amme & Associates, Inc., there are five stages of scandal. The Triad Group went through all five stages until the United States Marshals, arrived at the door to seize the products and shut them down (Amme, 2004). Could have The Triad Group avoided such a big scandal? Maybe not as the problems had started awhile back but what if the company had followed protocols. The first stage was no comment. Throughout the recalls and seizing of the products the Triad executives and spokesperson would decline to comment on the situation. Although the FDA (Food and Drug Administration) commented that the seizing of the products was to prevent the company from distributing any more products, Triad did not come forward. The best thing that the company could have done was to communicate throughout the crisis. Johnson and Johnson is such company after it was discovered that its Tylenol capsules had been laced with cyanide. Johnson and Johnson reacted in such an effective way that the case...

Words: 343 - Pages: 2

Premium Essay

Computersecurity

...keep the information that should be secure safe. In keeping this information safe, we have to look at many of the characteristics that it will take to keep that information safe. The characteristics that this personal data must have to be considered safe from those who are not privy to the information are called the Expanded CIA Triangle. When using computers, especially over the internet, keeping information safe and confidential will always be one of the toughest obstacles. Ensuring that you are using the Expanded CIA Triangle characteristics will increase that security but not prevent it from being compromised. As we all know, the CIA Triangle or Triad is based upon three principles. Those security principles are Confidentiality, Integrity and Availability. Despite these principles, it was necessary for an expansion of the triad because of the ever changing and developing minds of those who make attempts at information that should be kept confidential. Therefore the need for the Expanded CIA Triangle was necessary. Those principles being: Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility and Possession. I am the supervisor of training and development at a lodge and resort in the city of Frankenmuth, Michigan. I have access to company data that an hourly employee does not. I have a right to access this information while other staff members do not. This is the confidentiality part of my company’s triag. We have in place security measures where privileges...

Words: 905 - Pages: 4

Premium Essay

Novant Health Fact Sheet

...Fact Sheet Mission Novant Health exists to improve the health of our communities, one person at a time. Vision We, the employees of Novant Health and our physician partners, will deliver the most remarkable patient experience, in every dimension, every time. Values Compassion: We treat our customers and their families, staff and other healthcare providers as family members with kindness, patience, empathy and respect. Diversity: We recognize that every person is different, each shaped by unique life experiences. This enables us to better understand each other and our customers. Personal Excellence: We strive to grow personally and professionally and approach each service opportunity with a positive, flexible attitude. Honesty and personal integrity guide all we do. Teamwork: The needs and expectations of any one customer are greater than what one person's service efforts can satisfy. We support each other so that together as a team, we can be successful in the eye of the customer as a quality service provider. Inpatient facilities (hospitals)* | 13 | Partnership hospital | 1 | Licensed beds | 2,707 | Physician clinic locations | 343 | Primary service area | NC, SC, VA, GA | Employees | 24,400 | Medical group physicians | 1,123 | Emergency department visits | 542,000 | Surgeries | 121,000 | Births | 18,000 | Inpatient discharges | 122,000 | Physician medical group visits | 3,700,000 | Founded | July 1, 1997 | * Novant Health hospitals include...

Words: 377 - Pages: 2

Free Essay

The Female Triad

...The Female Athlete Triad The three components of the female athlete triad are energy availability, menstrual function, and bone mineral density. The triad is clinically referred to as eating disorders, amenorrhea, and osteoporosis. The female athlete triad has become more prevalent in the United States due to Title IX legislation. The triad is most common among the athletic population, but can occur in the athletic population. It is most common among athletes that are in sports the emphasize leanness. The pressure to perform at elite levels causes many female athletes to combine excessive exercise with calorie-poor diets. The benefits of exercise outweigh the risks, so women of all ages should be encouraged to participate in physical activity. It is important to rest your body between workouts to promote proper muscle and bone recovery. It is important to educate athletes, coaches, and parents on signs and symptoms of the triad to promote early detection and prevention. Energy availability is defined as dietary energy input minus exercise output. Energy availability is the amount of dietary energy remaining after exercise for other body functions. If energy availability gets to low physiological mechanisms reduce the amount of energy that is used for cellular maintenance, thermoregulation, growth, and reproduction. This can restore energy balance but it significantly impairs health. Athletes can cause an energy deficit in many different ways. Athletes reduce energy by binge-eating...

Words: 1181 - Pages: 5

Premium Essay

Basis

...policy must address the following: * Children’s access to inappropriate matter on the internet. * Children’s security when using e-mail, chat rooms, and other electronic communications. * Restricting hacking and other unlawful activities by children online. * Disclosing and distributing personal information about children without permission. * Restricting children’s access to harmful material. Family Education Rights and Privacy Act (FERPA) – Passed in 1974, FERPA protects the private data of students and their school records. Federal Information Security Management Act (FISMA) – Passed in 2002, the FISMA requires federal civilian agencies to provide security controls over resources that support federal operations. AIC triad: * Availability – Information is accessible by authorized users whenever they request the information. * Integrity – Only authorized users can change information. * Confidentiality – Only authorized users can view information. * Any event that results in a violation of any of the A-I-C security tenets is a security breach. Data classification standard –...

Words: 1342 - Pages: 6

Premium Essay

Business Management

...SECOND 21ST CENTURY ACADEMIC FORUM CONFERENCE AT HARVARD MARCH 8 - 10, 2015 MARTIN CONFERENCE CENTER HARVARD UNIVERSITY BOSTON, MA USA Teaching, Learning, and Research in the “Just Google It” Age CONFERENCE PROCEEDING VOL. 5, NO.1 ISSN: 2330-1236 Table of Contents Authors Paper Title Page Maryam Abdu Investigating Capital Structure Decisions and Its Effect on the Nigerian Capital Market 1 Norsuhaily Abu Bakar Rahimah Embong Ibrahim Mamat Ruzilawati Abu Bakar Idris Abd. Hamid Holistically Integraded Curriculum: Implications for Personality Development 16 Sandra Ajaps Geography Education in the Google age: A Case Study of Nsukka Local Government Area of Nigeria 30 Helen Afang Andow Impact of Banking Reforms on Service Delivery in the Nigerian Banking Sector 45 Billy Batlegang Green IT Curriculum: A Mechanism For Sustainable Development 59 Rozeta Biçaku-Çekrezi Student Perception of Classroom Management and Productive Techniques in Teaching 74 Thomas J.P.Brady Developing Digital Literacy in Teachers and Students 91 Lorenzo Cherubini Ontario (Canada) Education Provincial Policy: Aboriginal Student Learning 101 Jennifer Dahmen Natascha Compes Just Google It?! But at What Price? Teaching Pro-Environmental Behaviour for Smart and Energy-Efficient Use of Information and Communication Technologies 119 Marion Engin Senem Donanci Using iPads in a dialogic classroom: Mutually exclusive or naturally compatible? 132 Nahed Ghazzoul Teaching and Learning in...

Words: 236613 - Pages: 947

Premium Essay

Edphod8

...# 2011 University of South Africa All rights reserved Printed and published by the University of South Africa Muckleneuk, Pretoria EDPHOD8/1/2012Ð2014 98753223 3B2 Karin-mod Style CONTENTS Learning unit PREFACE SECTION 1 A theoretical framework 1 The pastoral role of the educator in South African public schools: a theoretical framework SECTION 2 Practical examples 2 Understanding cultural diversity in my public school classroom 3 The ABC of building schools for an integrated South African society Ð diverse people unite 4 Education for human rights and inclusivity 5 Child abuse: an educator's guide for the Senior Phase and FET 6 HIV/AIDS education at school 7 Educators' pastoral role in their schools and communities: an opportunity to care SECTION 3 Crisis and trauma in adolescence 8 Crisis: the theory 9 The crisis intervener and the person in crisis: prevention, prejudice and the intervener 10 Crisis intervention: general models 11 The skills for ensuring a positive relationship and interview between the crisis intervener and the adolescent in crisis SECTION 4 The religious world of the learner 12 Understanding religious diversity in my school 186 122 136 144 168 16 24 41 57 81 92 Page (iv) 2 EDPHOD8/1/2012±2014 (iii) PREFACE The study material for this module comprises four sections. Section 1: The theoretical framework for the pastoral role of the educator (see learning unit 1) Section 2: Practical examples to illustrate the applied competence of the community...

Words: 100366 - Pages: 402