Expanded Cia Triangle Essay

937 words - 4 pages

"This task was originally submitted during the 1301A session in CSS150-03 with  Donald Wilcoxen." 

Categories of the Expanded C.I.A Triangle
Jason Snyder
Colorado Technical University
CSS150-1302A-01
Introduction to Computer Security
Phase 1 IP
Instructor: Gregory Roby
April 15, 2013

Information in IT security is a valuable resource and asset. The value of the information from the characteristics it possesses cause appreciation or depreciation for the user of the information, In IT security there is seven characteristics for information to be considered valuable and secure. The expanded C.I.A triangle was created to explain those characteristics in more detail. The seven ...view middle of the document...

If a decimal point is in the wrong spot or a total entered incorrectly the value of the information is changed throwing the remaining expense sheet possibly being over the expenses limit causing a loss for the person.

Authenticity
Authenticity is the characteristic of information having quality or being in an original or genuine state rather than being a reproduction or fabricated piece of information. Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Emails are types of information that can be hard to authenticate due to spoofing and phishing. These are techniques used to hide who is actually sending the emails to encourage the user to open them thinking they are valid and secure.

Confidentiality
Confidentiality is the characteristic that works with other characteristics to prove its validity. It ensures that those who have rights and privileges to access information are permitted to do so. The confidentiality of the information can be protected by using information classification, secure document storage, application of general security policies, and education of end users. The value of confidenality is very high when personal information about employees, customers, and patients become involved.
Integrity
Integrity is the cornerstone of information systems, and refers to information being correct or consistent with the intended state of use. The integrity of the information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state. The corruption of information can occur from computer viruses and worms while information is being stored or transmitted. A key method for detecting a virus or worm is file hashing, in which a file is read by a special algorithm that uses the of the bits unique combination value of bits in a file to compute a single large number called a hash value. Information...

Other Papers Like Expanded Cia Triangle

International Economies Theory Essay

4241 words - 17 pages a decade into the 21st century, however, the picture is very different. Globalization has arrived, big time. International trade in goods and services has expanded steadily over the past six decades thanks to declines in shipping and communication costs, globally negotiated reductions in government trade barriers, the widespread outsourcing of production activities, and a greater awareness of foreign cultures and products. New and better

Freedom And Responsibility Essay

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages Essentially, everyone is in some state of vulnerability. However, some of us are more susceptible to harm due to our vulnerabilities. The susceptible are the individuals with the greatest risk. These individuals risk the loss of their autonomy, and maybe even their lives. Vulnerable populations can be found in every subset of society. However, as previously mentioned, there are some vulnerable populations that are at an even greater risk than

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages decision and relate it to the theory of incentives and efficiency wages. The decision to implement the five-dollar day minimum wage at Ford Motor came at a moment when the firm’s labour force had expanded more than thirty-fold in the previous six years. Output had risen twenty-five-fold in the previous five years and worker tasks had become increasingly menial and repetitive, with no room for discretion. This led to widespread employee

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages A Historical Analysis of the Economical Breakthroughs of the Industrial Revolution During the Industrial Revolution, many elements of society experienced huge breakthroughs that would change the way they functioned forever. Economics were definitely one of them. With many new inventions and many factories appearing, many, many, more resources were being created than ever before. Also, all of the revenue from these resources was being given to

Leadership Portrayed in Monologue from Shakespeare’s Henry V

1214 words - 5 pages Leadership is defined as a socially constructed process and which also affect organizational future outcomes. Leader is someone at high position who have overall duty for an organization, she or he decide what to do and the way how to achieve it. (Carter and Greer, 2013)The role of leader is extremely important for an organization, leader use their own power to influence the followers though many different ways such as motivation in order to

Related Essays

Principles Of Information Security Chapter 1

4922 words - 20 pages the early years of computing when security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers. This led to circumstances where most information being stored on computers was vulnerable since information security was often left out of the design phase of most systems. 5. What are the three components of the CIA triangle? What are they used for

Principles Of Information Security Essay

3291 words - 14 pages instance, end users may perceive a tenth-of-a-second delay in the computation of data to be an unnecessary annoyance. Information security professionals, however, may perceive that tenth of a second as a minor delay that enables an important task, like data encryption. Each critical characteristic of information—that is, the expanded C.I.A. triangle—is defined in the sections below. Availability Availability enables authorized users—persons or

Computer System Security Essay

3291 words - 14 pages instance, end users may perceive a tenth-of-a-second delay in the computation of data to be an unnecessary annoyance. Information security professionals, however, may perceive that tenth of a second as a minor delay that enables an important task, like data encryption. Each critical characteristic of information—that is, the expanded C.I.A. triangle—is defined in the sections below. Availability Availability enables authorized users—persons or

Principles Of Information Security Essay

3241 words - 13 pages perceive that tenth of a second as a minor delay that enables an important task, like data encryption. Each critical characteristic of information—that is, the expanded C.I.A. triangle—is defined in the sections below. Availability Availability enables authorized users—persons or computer systems—to access information without interference or obstruction and to receive it in the required format. Consider, for example, research libraries that