"This task was originally submitted during the 1301A session in CSS150-03 with Donald Wilcoxen."
Categories of the Expanded C.I.A Triangle
Colorado Technical University
Introduction to Computer Security
Phase 1 IP
Instructor: Gregory Roby
April 15, 2013
Information in IT security is a valuable resource and asset. The value of the information from the characteristics it possesses cause appreciation or depreciation for the user of the information, In IT security there is seven characteristics for information to be considered valuable and secure. The expanded C.I.A triangle was created to explain those characteristics in more detail. The seven ...view middle of the document...
If a decimal point is in the wrong spot or a total entered incorrectly the value of the information is changed throwing the remaining expense sheet possibly being over the expenses limit causing a loss for the person.
Authenticity is the characteristic of information having quality or being in an original or genuine state rather than being a reproduction or fabricated piece of information. Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Emails are types of information that can be hard to authenticate due to spoofing and phishing. These are techniques used to hide who is actually sending the emails to encourage the user to open them thinking they are valid and secure.
Confidentiality is the characteristic that works with other characteristics to prove its validity. It ensures that those who have rights and privileges to access information are permitted to do so. The confidentiality of the information can be protected by using information classification, secure document storage, application of general security policies, and education of end users. The value of confidenality is very high when personal information about employees, customers, and patients become involved.
Integrity is the cornerstone of information systems, and refers to information being correct or consistent with the intended state of use. The integrity of the information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state. The corruption of information can occur from computer viruses and worms while information is being stored or transmitted. A key method for detecting a virus or worm is file hashing, in which a file is read by a special algorithm that uses the of the bits unique combination value of bits in a file to compute a single large number called a hash value. Information...