Cia Triad

In: Computers and Technology

Submitted By nvuschrome
Words 635
Pages 3
Anthony Bellamy
Phase 1 IP
CSS150-1301A-01
Instructor Cordero
Ctu Online
1/15/2013

The CIA Triad was found to have vulnerabilities so the Expanded CIA Triad was created. This Expanded CIA Triad has seven different categories. I will be discussing these seven different categories, summarizing their security goals, and discuss how the goals can be accomplished with the use of software or hardware.
Availability permits authorized user whether person or computer systems to presence of data or systems at all times or whenever needed, without intrusion or impediment. Users are required to be able to access required and permitted data when needed by the users. The security goal for availability is to make the information and data available to authorized users in the required formatting. Availability may be accomplished through reliable software systems that can recover data and information easily and automatically.
Accuracy is data that is free errors and mistakes and is presented in the value that is expected of the end user. The security goal of accuracy is to provide correct information, with no errors, and with the proper value. Avoidance of any such errors of mistakes is to be accomplished by accuracy. This is achievable with software that is thorough and preforms testing and verification of information.
Authentication is the state of being authentic or quality of information or data versus it being a reproduction or manufactured fake. The goal of authentication is to verify to the users that the particular information or data is being presented in the same form that it was created, entered, saved, or transferred. Authentication can be accomplished by using verification of data and information software that scans accessed data or information as it is presented to the user. Confidentiality is ensuring the information or data is accessed by authorized…...

Similar Documents

The Female Triad

...The Female Athlete Triad The three components of the female athlete triad are energy availability, menstrual function, and bone mineral density. The triad is clinically referred to as eating disorders, amenorrhea, and osteoporosis. The female athlete triad has become more prevalent in the United States due to Title IX legislation. The triad is most common among the athletic population, but can occur in the athletic population. It is most common among athletes that are in sports the emphasize leanness. The pressure to perform at elite levels causes many female athletes to combine excessive exercise with calorie-poor diets. The benefits of exercise outweigh the risks, so women of all ages should be encouraged to participate in physical activity. It is important to rest your body between workouts to promote proper muscle and bone recovery. It is important to educate athletes, coaches, and parents on signs and symptoms of the triad to promote early detection and prevention. Energy availability is defined as dietary energy input minus exercise output. Energy availability is the amount of dietary energy remaining after exercise for other body functions. If energy availability gets to low physiological mechanisms reduce the amount of energy that is used for cellular maintenance, thermoregulation, growth, and reproduction. This can restore energy balance but it significantly impairs health. Athletes can cause an energy deficit in many different ways. Athletes reduce energy by......

Words: 1181 - Pages: 5

Cia World Factbook

...CIA WORLD FACTBOOK The CIA World Factbook is a reference resource produced by the Central Intelligence Agency of the United States with almanac-style information about the countries of the world. The website’s main page states that their goal as to provide information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 267 world entities. The CIA itself is a faction of the United States of America operating as an independent US Government agency responsible for providing national security intelligence to senior US policy makers. The website provides a broad range of information about most countries including but not limited to geographic conditions, social/ political climate, economic status and military advancement. Each country has a detailed portfolio of original information as well as brief comparisons to American states and landmarks for better comprehension of the scale and size of countries/ regions. I found the website’s information particularly helpful and informative in providing social context to countries that I was familiar with personally, leading me to believe it would be a useful tool in assessing a country as far as social climate to choose the correct product/ service to market in said country. The information on the diversity and distribution of religion throughout the country is also relevant to part 1 of the term project. Religion has a massive influence on people and greatly......

Words: 362 - Pages: 2

7 Expanded Layers of the Cia Triad

...There are seven expanded categories to the C-I-A Triad. They include: Confidentiality, Integrity, Availability, Accuracy, Authentication, Utility and Possession. By understanding all seven expanded areas of the C-I-A Triad there is a better chance of keeping your information secure. Confidentiality is ensuring the authorized access. The goal of confidentiality is to ensure restricted access and only authorized people are to be allowed to access the secure data. A breach of confidentiality may take place through different means, for instance hacking or social engineering data. An example of a violation of confidentiality is Salami Theft. A person knows he can’t steal the entire salami without it being noticed. By taking small pieces over time that person has the entire salami. In information security, this occurs when an employee steals a few pieces of information over time. Taking more would be noticed, but eventually the employee gets the entire information. To protect the confidentiality of information, you can use a number of measures. It can be accomplished by classifying data and implementing security policies, user names, passwords, access control lists, and both file and volume encryption. Protection is from firewalls, file permissions, education of information custodians and end users. Integrity is to protect data from modification or deletion by unauthorized parties, and ensuring that when authorized people make changes that shouldn’t have been made the damage can......

Words: 675 - Pages: 3

Expanded Cia Triangle.

...Sara Williams CSS150-1301B-01 Phase 1 Individual Project 2-23-2013 “The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security.” http://www.techrepublic.com/blog/security/the-cia-triad/488 CIA stands for Confidentiality, Integrity, and availability. The CIA Triad was developed so that people think about the important aspects of IT security. The 7 different categories of the Expanded CIA triangle are: Confidentiality, Integrity, Availability, Accuracy, Utility and Possession. Confidentiality is important when protecting sensitive information from others that don’t have the authorization to access it. A user can separate information into collections organized, and can pick who will have access to it and how sensitive they want it. Some use encryption to keep data confidential. The open source tools will also keep data safe from unauthorized people in the network. There are many methods to keep important data confidential. Integrity protects the data from modification or being deleted by unauthorized people. It also ensure that the authorized people can fix there mistakes. Some data can not be changed incorrectly, like the user account controls. If there are changes made the wrong way it can lead to service disturbances and confidentiality breaches the most common measures to guarantee integrity are traditional backups and version control......

Words: 532 - Pages: 3

George Tenent and the Last Days of Cia

...George Tenet and the Last Great Days of the CIA Lasheona Starr Dingle November 10, 2012 PAD 500: Modern Public Administration Professor Timothy Smith On July 11, 1997 at the age of 44, George Tenet was sworn into the CIA as the Director of Central Intelligence, better known as the DCI. (Stillman, 2010). Although he had no previous military experience, managed any large organizations, or shaped American foreign policy. (Stillman, 2010). Tenet was Director of Central Intelligence during William (Bill) J. Clinton’s and the majority of George W. Bush’s administration. Tenet wanted to build the reputation of the CIA, which had declined since the Cold War. He also wanted to improve the morale and gain additional funding for better technology within the CIA. When George W. Bush came into office, Tenet had built supporters on both sides of the political parties. Tenet had also built support inside the intelligence community, crucially and particularly in the Directorate of Operations [DO] at the CIA. He had won support from everyone including the new President Bush. (Coll, 2006) Although Tenet had the intentions of being a great leader and rebuilding the trust of the American people there were many ethical dilemmas experienced that led to his demise. One of these dilemmas was the violation of national and international human rights. Tenet was also the “go-between” or the “mediator” with Yasser Arafat and......

Words: 1165 - Pages: 5

Cia Extended Triad

...CSS150-1302B-01: Introduction to Computer Security Week 1 Individual Project Brian Frank Colorado Technical University Online 5/27/2013 Name and describe the seven different categories of the Expanded CIA triangle. The seven expanded categories to the Expanded CIA Triad include Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility, and Possession (Northeastern University, n.d.). * Confidentiality is only allowing access of data to authorized personnel (Kim and Solomon, 2012). * Integrity is the accuracy and validity of data, only authorized persons can edit information (Kim and Solomon, 2012). * Availability is the amount of time authorized users can use an application, data, and/or a system (Kim and Solomon, 2012). * Accuracy is data free from errors or mistakes and has the value that the end user expects (Northeastern University, n.d.) * Authenticity is the original state of data and not a reproduction (Northeastern University, n.d.). * Utility is the state of having value or quality for some purpose (Northeastern University, n.d.). * Possession is the control state of ownership of an item (Northeastern University, n.d.). Provide a summary of the security goal of each category of the Expanded CIA triangle. * Confidentiality keeps unauthorized persons from data sensitive to the nature of its business, clients, or users (Kim and Solomon, 2012). This keeps unauthorized persons from......

Words: 1086 - Pages: 5

Cia Agent-Best Job

...The most rewarding occupation that one could have would be one in the field of Criminal Justice, especially as a Secret or Central Intelligence Agency (CIA) Agent. The average CIA Agent can make a six figured salary each year. The job of being a Secret Agent is also filled with thrills and excitement. The CIA Agent not only makes a nice salary and has an exciting job, but the CIA Agent also helps to ensure the safety the society. The US government trusts this group of highly qualified individuals to protect American citizens in various locations around the world. The job of a CIA Agent pays well monetarily, is exciting and provides safety and security to our nation. A CIA agent or spy can make a salary of more than $100,000 per year. A salary of that sum can provide the agent and his or her family with a very comfortable lifestyle. Some critics may argue that “money isn’t everything”, but money is very useful and needed in order to have a certain quality of life. Money pays for food, shelter, education and so much more. Just because of the money alone, a secret agent is a very rewarding occupation. However, money alone doesn’t make the occupation of CIA Agent the best occupation, but also the excitement that comes along with being a spy. As a CIA Agent, you’re trained to investigate real crimes, criminals, suspected criminals, and perceived threats, and doing it secretively. It is full of excitement and adventure, as the professionals travel across the world in two......

Words: 545 - Pages: 3

Aic Triad

...Introduction The AIC triad is one of the many approaches to secure networks in today's complex computing environments. What makes the AIC triad different from any other theory is that when it is used properly it forms the cornerstone of every aspect of computing and network security. Most IT security practices are focused on protecting systems from loss of confidentiality, loss of integrity, and loss of availability; these three together are referred to as the security triad, the CIA triad, and the AIC triad. Regardless of the order in which the letters are organized in the acronym, they refer to the same principles. Confidentiality, Integrity and Availability are the cornerstones to which a network is comprised. Each with its own independent yet very important role in networking. Confidentiality refers to access control and ensures that it is restricted to the individuals who have been previously authorized to access a network or one of its resources. Integrity addresses the validity of data and any networked object. It ensures that the unauthorized changes to the data or object is noticed so that appropriate actions can be taken. Availability’s meaning is essentially as simple as the word itself. It refers to the principle that addresses the need for an authorized user to have access to a resource as quickly as possible based off the networks functioning abilities. Availability In an information technology (IT) environment availability is one of the most......

Words: 1508 - Pages: 7

Fbi vs. Cia

...FBI vs. CIA FBI and CIA organizations have become popular world-wide because of the movies and shows that are based on them. The movies have created an allure about the secretive missions that are carried by these agencies that help protect the United States against threats that even the public is not aware of. Federal Bureau of Investigation (FBI) is a government agency that works under the United States Department of Justice. They are responsible for protecting the citizens of United States nationwide. FBI serves as a federal criminal investigative body as well as internal intelligence agency. Its main purpose is to protect the United States internally against threats such as terrorism, criminal activities, cyber criminal activities, etc. They are also responsible for digging up and recording information that is related to the security of the United States. The FBI was established in 1908 under name of Bureau of Investigation, which was then changed to Federal Bureau of Investigation in 1935. The headquarters of the agency is located in Washington D.C., with offices located all over the United States. The FBI is divided into areas such as National security, criminal, cyber, response, and services, human resources, science technology, and information technology. Central Intelligence Agency (CIA) is an independent civilian intelligence agency of the United States that is responsible for providing intelligence regarding national security to the US policymakers. They are...

Words: 531 - Pages: 3

George Tenet and the Last Days of the Cia

...George Tenet and the Last Days of the CIA Nadine Collins Strayer University Dr. Aristole Mante PAD500 Modern Public Administrations October 11, 2013 George Tenet and the Last Days of the CIA George Tenet served as Director of the Central Intelligence Agency from 1997 to 2004, under the administration of Bill Clinton and George W Bush. An intense period covering the terrorist attacks on September 11 and the U.S. invasion of Afghanistan and Iraq. (Stillman, 2010) This outline describes the ethical obligations of Tenets’ career. The Concept of Ethical Obligations is concerned with the process by which we clarify what is right and wrong and by which we act on what we take to be right; ethics involves the use of reasons in determining a proper course of action. Ethics is also the search for moral standards (Denhardt/Denhardt, 2010) or rules that determine the way a person behave. (?) In this case study, George Tenet and the Last Great Days of the CIA. The CIA Director, George Tenet was challenged with major cross-coded ethical dilemmas in his agency, which impact his leadership abilities. First, ethical dilemma that impact his leadership skills was during the Wye Oak negotiations, Tenet was serving as the go-between for Yasser Arafat and Israeli Prime Minister Binyamin Netanyahu (White, 2008) Members within the government did not think it was right for Tenet to play a significant role as it cause doubts in his cabinet and administration.......

Words: 542 - Pages: 3

Cia (Ideal Position)

...Ideal Organization: Central Intelligence Agency (CIA) After serving nine years in the Marine Corps, I have come to the conclusion that the ideal organization for me would be the Central Intelligence Agency (CIA). I have tried several companies in the civilian sector and have been unable to adapt because I enjoy the adrenaline and excitement law enforcement has to offer. Although the CIA does have plenty of organizational stressors, they have their solutions. I will discuss task demands, role demands, physical demands, and interpersonal demands of working with the CIA as well as analyze critical elements for effective group and work team performance to determine the necessary steps it would take to develop an effective team. I will evaluate conflict management styles and explain which style is most appropriate for the potential sources of conflict. Lastly, potential barriers to communication and how these barriers may impact group and work team performance. The CIA has several divisions and positions. There are two specific positions that I would apply for: Support Integration Officer (SIO) or Military Analyst, which both have heavy task demands, role demands, and physical demands. As a SIO, I would be responsible for supporting worldwide missions. They are required to deploy (which I have already experienced) to resolve tactical issues, while applying and creating new processes and procedures to fit requirements specific to their location. The job description for a special......

Words: 1242 - Pages: 5

Georgr Tanet and the Cia

...Introduction George tenet and the last great days of the CIA cases focus on ethics and public administration ,it is important to those who are studying in public administration because this case illustrate when the executive in public sectors confront with ethical dilemma which is the problem that usually face when working in public services because public sector are not private sectors which have the efficiency goal and make profits ,but those who work in public sectors are confront with the choice among efficiency equity moral and duty. The Facts and Chronology George Tenet was the Director of the Central Intelligence Agency from 1997 to 2004. Tenet graduated from the Georgetown University in 1976 with bachelor’s degree in foreign affairs, and received a master’s degree from Columbia in 1978. George Tenet is a product of Washington, during his career at Washington he was named to be workaholic straightforward and loyalty. After he had spent four years as a lobbyist, he stared his career in Capitol Hill as a legislative assistant for Senator John Heinz. In 1985 he began working for the Senate Select Committee on Intelligence (SSCI) which he had a reputation as an “effective and efficient staffer who served his boss well” Because of his loyalty, impressed by Oklahoma senator David Boren, he was appointed to be the director of the SSCI, one of the most prestigious positions on the Hill. Later, Tenet joined President Bill Clinton's national security transition team in...

Words: 913 - Pages: 4

Cia Factbook

...According to CIA factbook The GDP real growth rate was -1.4% in 2012 and is ranked 200 in the world. It was .4% in 2011 It was -.3% in 2010 GDP composition by sector Agriculture 3.3% Industry 24.4% Services 72.6% Labor force is 23.11 million which is 28th in world Unemployment rate is 26%, which is 175th in the world. (it was 21.7% in 2011) 21.1% of the population is below the poverty line the budget deficit is 7.4% of GDP which is 189th in the world. The inflation rate is 2.4% (it was 3.1% in 2011) in the world The industrial production growth rate is 5.9% which is 51st in the world The exports are $303.8 billion (was $309.6 billion in 2011) which is 19th in the world Exports include machinery, motor vehicles, foodstuffs, pharmaceuticals, medicines, other consumer goods The export partners are: france 17.8%, Germany 10.6%, Portugal 8.3%, Italy 8.3%, UK 6.7% Imports are $322.7 billion ($364.9 billion in 2011) which is 18th in the world Imported commodities include: machinery & equipment, fuels, chemicals, semifinished goods, foodstuffs, consumer goods, measuring & medical control insturments Import partners: Germany 13%, France 11.8%, Italy 6.7%, China 5.8%, Netherlands 5%, UK 4.5% (2011) They have 152 airports 36th in world ,15293 km of railways 18th in world, 681,298 km of roadways10th in the world, 1000 km of waterways (64th in the world),...

Words: 256 - Pages: 2

Cia Assignment

...CIA ASSIGNMENT Bob works for Company A and Company B and splits his time between both with his laptop. Bob physically works from both offices and needs to access resources on the Active Directory domain of each company. Unfortunately, no trust relationship exists between these two domains. The IT staff has developed three possible solutions and they want your input (as an Information Security Analyst) on which is the most ‘secure’. Solution 1. Set Bob up with a network account under each active directory domain: have him log in to whichever one he needs access to at the time. Although he may be physically working from Company A, he will likely still need to access resources from Company B and vice versa. Solution 2. Create a local profile on Bob’s laptop and have him manually map to the resources he needs access to and set his passwords to never expire on both domains. Solution 3. Because Company A and Company B are both bound by internal and industry regulations regarding maximum password age, a third (hybrid) solution was developed. This involves Bob working from a local profile (as seen in solution 2) but having to log into each domain once per password cycle to change his passwords before expiration. In this scenario, the best solution that allows a greater amount of availability and a relatively higher level of security would be solution 3. Granted that Bob would follow other protocols and secure his laptop at all times, this solution will allow him to access to...

Words: 427 - Pages: 2

Cia Overveiw

...the Office of Strategic Services (OSS) in 1942. The OSS – the forerunner to the CIA – had a mandate to collect and analyze strategic information. After World War II, however, the OSS was abolished along with many other war agencies and its functions were transferred to the State and War Departments. It did not take long before President Truman recognized the need for a postwar, centralized intelligence organization. To make a fully functional intelligence office, Truman signed the National Security Act of 1947 establishing the CIA. The National Security Act charged the CIA with coordinating the nation’s intelligence activities and correlating, evaluating and disseminating intelligence affecting national security. On December 17, 2004, President George W. Bush signed the Intelligence Reform and Terrorism Prevention Act which restructured the Intelligence Community by abolishing the position of Director of Central Intelligence (DCI) and Deputy Director of Central Intelligence (DDCI) and creating the position the Director of the Central Intelligence Agency (D/CIA). The Act also created the position of Director of National Intelligence (DNI), which oversees the Intelligence Community and the National Counterterrorism Center (NCTC). The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. The Director of the Central Intelligence Agency (D/CIA) is nominated by the president with the advice and consent of the Senate. The......

Words: 2144 - Pages: 9