Premium Essay

The Expanded C.I.A. Triangle

In:

Submitted By Samatau
Words 932
Pages 4
Phase 1, Individual Task 3 – The Expanded CIA Triangle
Erin R. Langes
Colorado Technical University

Author Note
This paper was prepared for CSS150, 1301B-04, taught by Robert Carpenter on 24 Feb 2013

Securing sensitive information, whether it is personal or business related, is vital to the integrity, if not survival of the entity that it belongs to. Personal information can be items like a social security number or a birth date, while sensitive business information can be either patented designs or even customer contact databases. Keeping information like this secure requires methodologies such as the usage of the three tenants of information or otherwise known as the C.I.A. triad (Kim & Solomon, 2011). The three most important parts that makes up this triad are: “Confidentiality”, “Integrity”, and “Availability”. The expanded version of the C.I.A. triad actually contains seven critical characteristics that further emphasize the important role of keeping sensitive information secure. The following paragraphs will explain the nature and detail of each of these seven characteristics. The first characteristic of ensuring information security is confidentiality. This characteristic defines who or what has authorized access to an entity’s sensitive information. The overall goal of this characteristic is to keep access to this information restricted to only those that need to know. A good example of confidentiality is where a car company’s authorized car design team has access to confidential design schematics on a secure computer server for a particular new car but the car company’s competitor does not. Integrity is the next characteristic whereas its goal is in ensuring that the sensitive information is intact, unmodified, and is free of any alterations or corruption. Sensitive information that is altered can be useless and may even contain

Similar Documents

Premium Essay

The Expanded C.I.A. Triangle

...ring sensitive information, whether it is personal or business related, is vital to the integrity, if not survival of the entity that it belongs to. Personal information can be items like a social security number or a birth date, while sensitive business information can be either patented designs or even customer contact databases. Keeping information like this secure requires methodologies such as the usage of the three tenants of information or otherwise known as the C.I.A. triad (Kim & Solomon, 2011). The three most important parts that makes up this triad are: “Confidentiality”, “Integrity”, and “Availability”. The expanded version of the C.I.A. triad actually contains seven critical characteristics that further emphasize the important role of keeping sensitive information secure. The following paragraphs will explain the nature and detail of each of these seven characteristics. The first characteristic of ensuring information security is confidentiality. This characteristic defines who or what has authorized access to an entity’s sensitive information. The overall goal of this characteristic is to keep access to this information restricted to only those that need to know. A good example of confidentiality is where a car company’s authorized car design team has access to confidential design schematics on a secure computer server for a particular new car but the car company’s competitor does not. Integrity is the next characteristic whereas its goal is in...

Words: 274 - Pages: 2

Premium Essay

Expanded Cia Triangle

..."This task was originally submitted during the 1301A session in CSS150-03 with  Donald Wilcoxen."  Categories of the Expanded C.I.A Triangle Jason Snyder Colorado Technical University CSS150-1302A-01 Introduction to Computer Security Phase 1 IP Instructor: Gregory Roby April 15, 2013 Information in IT security is a valuable resource and asset. The value of the information from the characteristics it possesses cause appreciation or depreciation for the user of the information, In IT security there is seven characteristics for information to be considered valuable and secure. The expanded C.I.A triangle was created to explain those characteristics in more detail. The seven characteristics for the triangle are Availability, Accuracy, Authenticity, Confidentiality, Integrity, Utility, and Possession. Availability Availability is a characteristic of making information accessible to person or computer system without interference or obstruction, as well as receiving the information in a required format. A good example of using availability is going to an ATM to deposit or with draw money. The ATM is available to all users that can verify that they have an account that contains enough funds to complete a transaction. The machine is made available with the use of magnetic card that has the user’s account information stored on it. When it comes to a computer or similar device availability to information mainly made is thru the use of user log-ins with a password. Accuracy ...

Words: 921 - Pages: 4

Premium Essay

Jjjjjj

...Chapter 1 Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management. Chapter Objectives When you complete this chapter, you will be able to: • Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets • Know and understand the definition and key characteristics of information security • Know and understand the definition and key characteristics of leadership and management • Recognize the characteristics that differentiate information security management from general management INTRODUCTION Information technology is the vehicle that stores and transports information—a company’s most valuable resource—from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this...

Words: 2580 - Pages: 11

Premium Essay

Principles of Information Security Chapter 1

...(assuring the security of utility services) related to information security? The availability of information assets is dependent on having information systems that are reliable and that remain highly available. 4. What type of security was dominant in the early years of computing? In the early years of computing when security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers. This led to circumstances where most information being stored on computers was vulnerable since information security was often left out of the design phase of most systems. 5. What are the three components of the CIA triangle? What are they used for? The three components of the C.I.A. are: • confidentiality (assurance that the...

Words: 4896 - Pages: 20

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997

Free Essay

Eqweqeqqe

...Praise for The Spirit Catches You and You Fall Down “Fadiman describes with extraordinary skill the colliding worlds of Western medicine and Hmong culture.” —The New Yorker “This fine book recounts a poignant tragedy…It has no heroes or villains, but it has an abundance of innocent suffering, and it most certainly does have a moral…[A] sad, excellent book.” —Melvin Konner, The New York Times Book Review “An intriguing, spirit-lifting, extraordinary exploration of two cultures in uneasy coexistence…A wonderful aspect of Fadiman’s book is her even-handed, detailed presentation of these disparate cultures and divergent views—not with cool, dispassionate fairness but rather with a warm, involved interest that sees and embraces both sides of each issue…Superb, informal cultural anthropology—eye-opening, readable, utterly engaging.” —Carole Horn, The Washington Post Book World “This is a book that should be deeply disturbing to anyone who has given so much as a moment’s thought to the state of American medicine. But it is much more…People are presented as [Fadiman] saw them, in their humility and their frailty—and their nobility.” —Sherwin B. Nuland, The New Republic 3/462 “Anne Fadiman’s phenomenal first book, The Spirit Catches You and You Fall Down, brings to life the enduring power of parental love in an impoverished refugee family struggling to protect their seriously ill infant daughter and ancient spiritual traditions from the tyranny of welfare bureaucrats and intolerant...

Words: 134140 - Pages: 537

Premium Essay

Critical Thinking

...individual teaching styles, resulting in an exceptionally versatile text. Highlights of the Fourth Edition: Additional readings and essays in a new Appendix as well as in Chapters 7 and 8 nearly double the number of readings available for critical analysis and classroom discussion. An online chapter, available on the instructor portion of the book’s Web site, addresses critical reading, a vital skill for success in college and beyond. Visit www.mhhe.com/bassham4e for a wealth of additional student and instructor resources. Bassham I Irwin Nardone I Wallace New and updated exercises and examples throughout the text allow students to practice and apply what they learn. MD DALIM #1062017 12/13/09 CYAN MAG YELO BLK Chapter 12 features an expanded and reorganized discussion of evaluating Internet sources. Critical Thinking thinking, using real-world examples and a proven step-by-step approach. A student ' s Introduction A student's Introduction everyday culture and critical thinking. It covers all the basics of critical Critical Thinking Ba ssha m I Irwin I Nardone I Wall ace CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM bas07437_fm_i-xvi.indd i 11/24/09 9:53:56 AM TM Published by McGraw-Hill, an imprint of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY 10020. Copyright © 2011, 2008, 2005, 2002. All rights reserved. No part of this publication may...

Words: 246535 - Pages: 987

Premium Essay

Marketing

...fourth EDItION Critical Thinking A student ' s Introduction Ba ssha m I I rwi n I N ardon e I Wal l ac e CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM TM Published by McGraw-Hill, an imprint of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY 10020. Copyright © 2011, 2008, 2005, 2002. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 DOC/DOC 0 ISBN: 978-0-07-340743-2 MHID: 0-07-340743-7 Vice President, Editorial: Michael Ryan Director, Editorial: Beth Mejia Sponsoring Editor: Mark Georgiev Marketing Manager: Pam Cooper Managing Editor: Nicole Bridge Developmental Editor: Phil Butcher Project Manager: Lindsay Burt Manuscript Editor: Maura P. Brown Design Manager: Margarite Reynolds Cover Designer: Laurie Entringer Production Supervisor: Louis Swaim Composition: 11/12.5 Bembo by MPS Limited, A Macmillan Company Printing: 45# New Era Matte, R. R. Donnelley & Sons Cover Image: © Brand X/JupiterImages Credits: The credits section for this book begins on page C-1 and is considered...

Words: 240232 - Pages: 961