CIA Triad Guide: Information Security Model

526 Words2 Pages

CIA triad guide provides an information security model that has three important components to identify gaps and issues as well as corresponding remedies to fill the gaps. The three components that are assessed and evaluated in the information are confidentiality, integrity and availability.  Confidentiality refers to information access to the right people or authorized users only. This means that the information or data is secure and has not been compromised to unauthorized users. Major damage to confidentiality would mean that personal unique identifying information would be compromised and accessed by unauthorized users such as cyber criminals and hackers. The types of damage can be anywhere from your Yahoo user ID and password, banking information, SSN, addresses and other personal information when all pieced together can have a lot of financial gain for the cyber hacker. They could take all secure information and to not only disrupt various services for …show more content…

Integrity of information means that the origin or source of the information actually came from the right source. It also means that the information in the database is correct and reflects the actual circumstance. Information going into the system needs to be true, accurate and reliable. Damage to the integrity of the information means, you cannot rely that the company is able to provide reliable and true information. This would mean of face loss, trust, and ability and in some cases like the medical profession could even mean loss of life. If information is compromised or modified, this would be gravely damaging in the medical profession to get the wrong dosage of medication or it could lead to wrong diagnosis. The manufacturing business may lose revenues for having the incorrect numbers for consumer demand versus supply

More about CIA Triad Guide: Information Security Model

Open Document