Information and the CIA Triad

1330 Words3 Pages

CIA Triad? Sounds like a secret organization doesn’t it? It almost feels like people are going to come to a screeching halt in your driveway, jump out and take you away, never to be seen again. Sounds very scary. Good thing for us that is not going to happen. Lets get to the point. Information is defined as raw data, which includes words, numbers, value etc. It includes analytical and Factual information. Security is defined as the prevention of intentional harm. The CIA Triad is structure of policies relating to solving problems dealing with information security. Julius Caesar was the first to create something that could be considered as information security. He invented the Caesar cipher. Unless you were meant to see his messages, it was totally undecipherable. There are two categories within information systems: IT security and information assurance. IT security is mainly for any device that uses a processor; the system protects it from any malicious attacks such as cyber attacks. Information Assurance is making sure that if there is a problem that all data gets backed up and does not suffer harm after an attack. Over the years the government, employers etc. have gotten large amounts of information on people around the world and now since we are in a technological age all of that information is stored on computers and shared through out a network. Now imagine if that information were to get into the wrong hands, it would be a major catastrophe. As a user of electronic devices, we want to be sure we protect our privacy too. If we have our financial information on our devices, we want to be sure that it’s safe and will not be used to ruin us financially. This is the CIA Triad comes into play. The CIA defends information from unau...

... middle of paper ...

...r every possibility. One goes through each pro and con. The grid is divided in a 2x2 template with four templates with each of the SWOT acronyms as headers.

Strengths Weaknesses

No unauthorized access hacking

Allow access to those who need it

Opportunities Threats

Allow access to those who need hacking

it and allow people to choose who phishing

can access it

Our Information systems seem to be safe for now and hopefully we can keep it as it is, with a little more improvement.

Work Cited

Cryptography 101 with SSL. InfoSec Institute. 2013. http://resources.infosecinstitute.com/cryptography-101-with-ssl/

Gibson, Darril. Understanding The Security Triad (Confidentiality, Integrity, and Availability). Pearson IT Certification. 2011. http://www.pearsonitcertification.com/articles/article.aspx?p=1708668

More about Information and the CIA Triad

Open Document