Premium Essay

Expanded Cia Triangle.

In: Computers and Technology

Submitted By sarawilliams
Words 532
Pages 3
Sara Williams
CSS150-1301B-01
Phase 1 Individual Project
2-23-2013

“The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security.” http://www.techrepublic.com/blog/security/the-cia-triad/488 CIA stands for Confidentiality, Integrity, and availability. The CIA Triad was developed so that people think about the important aspects of IT security. The 7 different categories of the Expanded CIA triangle are: Confidentiality, Integrity, Availability, Accuracy, Utility and Possession.
Confidentiality is important when protecting sensitive information from others that don’t have the authorization to access it. A user can separate information into collections organized, and can pick who will have access to it and how sensitive they want it. Some use encryption to keep data confidential. The open source tools will also keep data safe from unauthorized people in the network. There are many methods to keep important data confidential.
Integrity protects the data from modification or being deleted by unauthorized people. It also ensure that the authorized people can fix there mistakes. Some data can not be changed incorrectly, like the user account controls. If there are changes made the wrong way it can lead to service disturbances and confidentiality breaches the most common measures to guarantee integrity are traditional backups and version control systems.
Availability, you got to have availability to your data in some cases. There are many approaches to availability, depending on the specific HA system design it could target hardware failures upgrades, and power outages. It could also accomplish many network connections to get around network outages, or maybe it was intended for dealing with potential availability problems like rejection of service

Similar Documents

Premium Essay

Expanded Cia Triangle

..."This task was originally submitted during the 1301A session in CSS150-03 with  Donald Wilcoxen."  Categories of the Expanded C.I.A Triangle Jason Snyder Colorado Technical University CSS150-1302A-01 Introduction to Computer Security Phase 1 IP Instructor: Gregory Roby April 15, 2013 Information in IT security is a valuable resource and asset. The value of the information from the characteristics it possesses cause appreciation or depreciation for the user of the information, In IT security there is seven characteristics for information to be considered valuable and secure. The expanded C.I.A triangle was created to explain those characteristics in more detail. The seven characteristics for the triangle are Availability, Accuracy, Authenticity, Confidentiality, Integrity, Utility, and Possession. Availability Availability is a characteristic of making information accessible to person or computer system without interference or obstruction, as well as receiving the information in a required format. A good example of using availability is going to an ATM to deposit or with draw money. The ATM is available to all users that can verify that they have an account that contains enough funds to complete a transaction. The machine is made available with the use of magnetic card that has the user’s account information stored on it. When it comes to a computer or similar device availability to information mainly made is thru the use of user log-ins with a password. Accuracy ...

Words: 921 - Pages: 4

Premium Essay

Computersecurity

...Information Technology and its security, we have to consider the need and necessity to keep the information that should be secure safe. In keeping this information safe, we have to look at many of the characteristics that it will take to keep that information safe. The characteristics that this personal data must have to be considered safe from those who are not privy to the information are called the Expanded CIA Triangle. When using computers, especially over the internet, keeping information safe and confidential will always be one of the toughest obstacles. Ensuring that you are using the Expanded CIA Triangle characteristics will increase that security but not prevent it from being compromised. As we all know, the CIA Triangle or Triad is based upon three principles. Those security principles are Confidentiality, Integrity and Availability. Despite these principles, it was necessary for an expansion of the triad because of the ever changing and developing minds of those who make attempts at information that should be kept confidential. Therefore the need for the Expanded CIA Triangle was necessary. Those principles being: Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility and Possession. I am the supervisor of training and development at a lodge and resort in the city of Frankenmuth, Michigan. I have access to company data that an hourly employee does not. I have a right to access this information while other staff members do not. This is the confidentiality...

Words: 905 - Pages: 4

Premium Essay

Cia Extended Triad

...CSS150-1302B-01: Introduction to Computer Security Week 1 Individual Project Brian Frank Colorado Technical University Online 5/27/2013 Name and describe the seven different categories of the Expanded CIA triangle. The seven expanded categories to the Expanded CIA Triad include Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility, and Possession (Northeastern University, n.d.). * Confidentiality is only allowing access of data to authorized personnel (Kim and Solomon, 2012). * Integrity is the accuracy and validity of data, only authorized persons can edit information (Kim and Solomon, 2012). * Availability is the amount of time authorized users can use an application, data, and/or a system (Kim and Solomon, 2012). * Accuracy is data free from errors or mistakes and has the value that the end user expects (Northeastern University, n.d.) * Authenticity is the original state of data and not a reproduction (Northeastern University, n.d.). * Utility is the state of having value or quality for some purpose (Northeastern University, n.d.). * Possession is the control state of ownership of an item (Northeastern University, n.d.). Provide a summary of the security goal of each category of the Expanded CIA triangle. * Confidentiality keeps unauthorized persons from data sensitive to the nature of its business, clients, or users (Kim and Solomon, 2012). This keeps unauthorized persons from data sensitive...

Words: 1086 - Pages: 5

Premium Essay

The Expanded C.I.A. Triangle

...Phase 1, Individual Task 3 – The Expanded CIA Triangle Erin R. Langes Colorado Technical University Author Note This paper was prepared for CSS150, 1301B-04, taught by Robert Carpenter on 24 Feb 2013 Securing sensitive information, whether it is personal or business related, is vital to the integrity, if not survival of the entity that it belongs to. Personal information can be items like a social security number or a birth date, while sensitive business information can be either patented designs or even customer contact databases. Keeping information like this secure requires methodologies such as the usage of the three tenants of information or otherwise known as the C.I.A. triad (Kim & Solomon, 2011). The three most important parts that makes up this triad are: “Confidentiality”, “Integrity”, and “Availability”. The expanded version of the C.I.A. triad actually contains seven critical characteristics that further emphasize the important role of keeping sensitive information secure. The following paragraphs will explain the nature and detail of each of these seven characteristics. The first characteristic of ensuring information security is confidentiality. This characteristic defines who or what has authorized access to an entity’s sensitive information. The overall goal of this characteristic is to keep access to this information restricted to only those that need to know. A good example of confidentiality is where a car company’s authorized car design team...

Words: 932 - Pages: 4

Free Essay

Security Plan

...The seven categories of the expanded CIA triangle are confidentiality, integrity, availability, authentication, accuracy, utility, and possession. I will now go over each and give them a little substance. I used the link provided in the instructor files which was very helpful by the way. Confidentiality “Confidentiality ensures that only those with the rights and privileges to access information are able to do so. When unauthorized individuals or systems can view information, confidentiality is breached.” (http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf) “In an organization, the value of confidentiality of information is especially high when it involves personal information about employees, customers, or patients. Individuals who deal with an organization expect that their personal information will remain confidential, whether the organization is a federal agency, such as the Internal Revenue Service, or a business.” ((http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf.) This is a concept true in the Army there are two different levels of security clearances for everyone. There is the secret and the top secret each requires a vigorous investigation into a person’s past to make sure they should have the level of clearance they are requesting. If a person doesn’t have at least a secret clearance they are not allowed to access the SIPRnet, which is the Secret Internet Protocol Router Network. This network protocol holds all of the units secure data and can only...

Words: 889 - Pages: 4

Premium Essay

Jjjjjj

...Chapter 1 Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management. Chapter Objectives When you complete this chapter, you will be able to: • Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets • Know and understand the definition and key characteristics of information security • Know and understand the definition and key characteristics of leadership and management • Recognize the characteristics that differentiate information security management from general management INTRODUCTION Information technology is the vehicle that stores and transports information—a company’s most valuable resource—from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this...

Words: 2580 - Pages: 11

Premium Essay

Principles of Information Security Chapter 1

... How is infrastructure protection (assuring the security of utility services) related to information security? The availability of information assets is dependent on having information systems that are reliable and that remain highly available. 4. What type of security was dominant in the early years of computing? In the early years of computing when security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers. This led to circumstances where most information being stored on computers was vulnerable since information security was often left out of the design phase of most systems. 5. What are the three components of the CIA triangle? What are they used for? The three components of the C.I.A. are: • confidentiality (assurance that the...

Words: 4896 - Pages: 20

Free Essay

Anth106 Notes

...Anthropology Lecture 1 introduction Common Misconceptions with Drugs . The effect of a drug is caused solely by its pharmacological properties and effects. . Some drugs are instantly addictive . The gateway/ stepping stone theory - the use of 1 drug leads to the use of other more dangerous drugs What are drugs ? Krivanek's definition : Drugs are substances that are introduced into the body knowingly but not as food. Therefore illicit drugs, legal recreational drugs and legal but regulated pharmaceutical drugs that aren't recreational at all. - Whether if a drug is considered bad and is prohibited depends on the culture of the society in a particular period. What is culture ? The definition of culture = Through Roger keesing and Andrew Strathern's definition it is a system of shared ideas, rules and meanings that underlie and are expressed in the ways that human live. - This includes : law, beliefs, political economy, media and popular culture - this perceives ideas about what is normal and abnormal to society. " Culture is always changing and contested, not unified" Enthography as a method for studying drug use It is a process of observing, recoding and describing other peoples way of life through intimate participation the community being studied". - Participation observation, involving yourself in the life of the community , taking up the life of the other person, observing their actions, asking questions and learning what questions...

Words: 21869 - Pages: 88

Free Essay

The Guyana

...Guyana From Wikipedia, the free encyclopedia Not to be confused with French Guiana or Guinea. For other uses, see Guyana (disambiguation). Coordinates: 5°00′N 58°45′W Co-operative Republic of Guyana[1] Flag Coat of arms Motto: "One People, One Nation, One Destiny" Anthem: "Dear Land of Guyana, of Rivers and Plains" Capital (and largest city) Georgetown 6°46′N 58°10′W Official language(s) English Recognised regional languages Portuguese, Hindi, Spanish, Akawaio, Macushi, Wai Wai, Arawak, Patamona, Warrau, Carib, Wapishiana, Arekuna National language Guyanese Creole Ethnic groups (2002) East Indian 43.5% Black (African) 30.2% Mixed 16.7% Amerindian 9.1% Other 0.5%[2][3] Demonym Guyanese Government Unitary Semi-presidential republic - President Donald Ramotar - Prime Minister Sam Hinds Legislature National Assembly Independence - from the United Kingdom 26 May 1966 - Republic 23 February 1970 Area - Total 214,970 km2 (84th) 83,000 sq mi - Water (%) 8.4 Population - July 2010 estimate 752,940[2]1 (161st) - 2002 census 751,223[3] - Density 3.502/km2 (225th) 9.071/sq mi GDP (PPP) 2011 estimate - Total $5.783 billion[4] - Per capita $7,465[4] GDP (nominal) 2011 estimate - Total $2.480 billion[4] - Per capita $3,202[4] HDI (2010) 0.611[5] (medium) (107th) Currency Guyanese dollar (GYD) Time zone GYT Guyana Time (UTC-4) Drives on the left ISO 3166 code GY Internet TLD .gy Calling code 592 1 Around...

Words: 8406 - Pages: 34

Free Essay

Fraud

...Classroom Case Demonstration “Something’s Fishy at Jones Company – from Investigation to Confession.” Designed for the classroom or a seminar, an intrepid seasoned internal audit manager and an inexperienced but willing staff auditor investigate suspicious financial activity at Jones Company. Their discoveries reveal their hunch was right, and they are able to stop the fraud. This case can be used in a classroom or seminar setting to: ● Discuss the Fraud Triangle and the importance of symptoms ● Discuss accounting symptoms of fraud ● Perform financial statement analyses to determine if fraud is suspected ● Identify and test a fraud hypothesis ● Analyze an interview ● Analyze an interrogation ● Draw conclusions and prepare fraud reports The case requirements include: 1. Perform horizontal and vertical analyses of the financial statements. 2. Describe other financial statement analyses that the auditor could have performed. 3. Describe a public records search. 4. Analyze this case using the fraud triangle. 5. What is the fraud hypothesis in this case? Session Topics This case includes teaching notes (provided on the conference website) and a video (30 minutes) depicting a suspect interview and a separate interrogation. The video highlights verbal and non-verbal cues to look for when interviewing and a non-confrontational approach to interrogation. During this session we will view the video and discuss how the case might be used in the classroom or seminar. Copies of the video will...

Words: 9218 - Pages: 37

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997

Premium Essay

Accountancy

...Chapter 1: The problem and its background Introduction For a long time, India has viewed its sphere of influence as stretching far beyond the subcontinent itself but has had little ability to project this influence beyond its borders. It is only in the last few years that India has been able to become more influential both in the surrounding regions and the world at large. This was mainly anchored on its ‘look east policy’ initiated in the early 1990s that saw the country focus on the East Asia and Pacific regions as an economic framework for expanding ties and promoting economic growth. With the new expanded strategic vision – “Look East” policy 2, India has broadened the definition of its security interest in its strategic economic endeavors. It is generally seen that India’s partnership with ASEAN have had an impact on India’s economic, political, and security related involvement ‘in these larger, concentric coalitions around ASEAN…in East Asia and in the Asian Pacific’ (Gujral, 1996, p. 12). The look east policy has integrated a larger regionalization framework and strategy encompassing the Asia Pacific issues (Scott, 2007). WE ARE TECHNOLOGY THESIS EXPERTS! ORDER NOW! WWW.UKESSAYHUB.COM The Indians-ASEAN links do not only have economic frameworks but strategic underpinnings as well. As Scot (2007) has indicated, china has been a factor in all of the India’s initiatives albeit blurred in economic progressions. Some analysts have argued that the growing...

Words: 30557 - Pages: 123

Free Essay

State of the World

...Barbados Barbados is a North American sovereign island country located in the Caribbean. The capital of this state is Bridgetown. This state raised its head as an independent state in 1966 after being a Colony of the British Empire for almost 350 years. Category | Fact | Category | Fact | 1.Size | 439 Square km | 4.Religion | Christianity | 2.Population | 277,821 | 5.Currency | Barbadian Dollar | 3.Language | Barbadian | 6.GDP Rate | $16,653 | The main resources of Barbados are Petroleum, Fish, Natural gas, Sugarcane etc. The national symbols of Barbados are Neptune's trident, pelican, and Red Bird of Paradise flower (also known as Pride of Barbados). In Barbados Queen Elizabeth II is the Head of the State and represented locally by Governor General which is at present Elliott Belgrave. These two heads are advised by the Prime Minister of Barbados who is also the Head of the Government on matters of Barbadian state. The current Prime Minister of Barbados is Freundel Stuart. ...

Words: 64439 - Pages: 258

Free Essay

As It Goes

...Contents Preface to the First Edition Introduction Part 1. Thought Control: The Case of the Middle East Part 2. Middle East Terrorism and the American Ideological System Part 3. Libya in U.S. Demonology Part 4. The U.S. Role in the Middle East Part 5. International Terrorism: Image and Reality Part 6. The World after September 11 Part 7. U.S./Israel-Palestine Notes Preface to the First Edition (1986) St. Augustine tells the story of a pirate captured by Alexander the Great, who asked him "how he dares molest the sea." "How dare you molest the whole world?" the pirate replied: "Because I do it with a little ship only, I am called a thief; you, doing it with a great navy, are called an Emperor." The pirate's answer was "elegant and excellent," St. Augustine relates. It captures with some accuracy the current relations between the United States and various minor actors on the stage of international terrorism: Libya, factions of the PLO, and others. More generally, St. Augustine's tale illuminates the meaning of the concept of international terrorism in contemporary Western usage, and reaches to the heart of the frenzy over selected incidents of terrorism currently being orchestrated, with supreme cynicism, as a cover for Western violence. The term "terrorism" came into use at the end of the eighteenth century, primarily to refer to violent acts of governments designed to ensure popular submission. That concept plainly is of little benefit to the practitioners of state terrorism...

Words: 93777 - Pages: 376

Free Essay

Dan Brown

...thanks to three dear friends with whom I have the great luxury of working: my editor, Jason Kaufman; my agent, Heide Lange; and my counselor, Michael Rudell. In addition, I would like to express my immense gratitude to Doubleday, to my publishers around the world, and, of course, to my readers. This novel could not have been written without the generous assistance of countless individuals who shared their knowledge and expertise. To all of you, I extend my deep appreciation. To live in the world without becoming aware of the meaning of the world is like wandering about in a great library without touching the books. The Secret Teachings of All Ages ———————————— FACT: In 1991, a document was locked in the safe of the director of the CIA. The document is still there today. Its cryptic text includes references to an ancient portal and an unknown location underground. The document also contains the phrase “It’s buried out there somewhere.” All organizations in this novel exist, including the Freemasons, the Invisible College, the Office of Security, the SMSC, and the Institute of Noetic Sciences. All rituals, science, artwork, and monuments in this novel are real. ———————————— Prologue House of the Temple 8:33 P.M. The secret is how to die. Since the beginning of time, the secret had always been how to die. The thirty-four-year-old initiate gazed down at the human skull cradled in his palms. The skull was hollow, like a bowl, filled with bloodred wine. Drink it,...

Words: 164451 - Pages: 658