Hello I need help with my individual project in my Into to Computer Security cla
ID: 3633774 • Letter: H
Question
Hello I need help with my individual project in my Into to Computer Security class due to my work schedule and the holidays I really don't have time for this right now! If anyone could help me out it'd be greatly appreciated here is the the project it's due by tomorrow night by midnight!Name and describe the 7 different categories of the Expanded CIA triangle.
Provide a summary of the security goal of each category of the Expanded CIA triangle.
Provide an example of how the security goal is accomplished using hardware or software.
This is what I need above thanks!!
Explanation / Answer
Seven categories of CIA triangle are: 1. Confidentiality: Confidentiality is ensuring the authorized access. The goal of confidentiality is to ensure restricted access. Only authorized people are to be allowed to access the secure data. Confidentiality can be accomplished by classifying data and implementing security policies. 2. Integrity: Integrity is to provide data as usual without unnecessary changes made. The goal of integrity is to maintain data without any illegal data modifications or data corruption. Integrity can be accomplished by file hashing methods. 3. Availability: Availability is the presence of data or system all the time whenever needed, without failure. Users must be able to access the required and authorized information whenever needed. Security goal of availability is not only to make the information available to users but also only to the authorized users. Availability can be accomplished by using reliable systems and that can recover easily and automatically. 4. Accuracy: Accuracy is to ensure data without errors and mistakes. The security goal of accuracy is to provide correct information. Information with errors causes problems. To avoid such problems, accuracy is to be accomplished. It can be accomplished by thorough testing and verification of information. 5. Authenticity: Authentication is to verify the identity of the user. Its goal is to verify the users and their privileges to access particular information. Authentication can be accomplished by using passwords, account numbers, user identifications etc. 6. Utility: Utility is the availability of information in a way that can be utilized properly. The goal of utility is to make proper use of information and handling of data. Without proper utilization of information, security may be breached where the information may be misused. Utility can be accomplished be reviewing the company’s policies, standards etc and implementing them. 7. Possession: Possession is the ownership of the information. Security goal of possession is to ensure that information is under the control of right persons. Possession can be accomplished by ensuring confidentiality and implementing encryption techniques and security policies.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.