Describe how the principles of confidentiality integrity and

Describe how the principles of confidentiality, integrity, and availability have their roots in formal modes for security specification.

What is the essence of computer security from a personal user standpoint? Name a current event topic and the security issues related to confidentiality, integrity, and availability.

Solution

Confidentiality, integrity and availability also known as CIA triad, which is designed to guide the policies for information security within an organisation and are considered the most crucial components of security.

All security controls, mechanism and safeguards are implemented to provide one or more of these principles. All risks, threats and vulnerabilities are measured by CIA principles.

Confidentiality -

Confidentiality is a set of rules that limits access to information. Confidential information must be accessed, used or disclosed by authorized users. It ensures that the necessary level of secrecy at each junction of data processing and prevents unauthorized disclosure. The measures taken are encrypting data as it is stored and transmitted, by using network padding and training personnel on proper procedures.

Integrity -

Integrity is the assurance that the information is trustworthy, accurate and unauthorized modification is prevented. Threat sources are Viruses, logic bombs. Countermeasures are Strict access control, hashing and intrusion detection.

Availability -

Availability is a guarantee of reliable and timely access to the information by authorized people by taking measures such as maintaining backups to replace the failed system, use firewall and router configurations.

Essence of computer security -

Computer security is important for personal user to keep the information protected. It\'s also important for computer\'s overall health, helping to prevent viruses and malware and helping programs to run smoothly.

For example, threat to people when opening unknown attachments and links in emails. These attachments and links can add viruses and other malware to the system.

The Internet of Things consist of billions of individuals, individual devices and services that can interconnect to exchange data and useful information. As loT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for loT are required to ensure exact and accurate confidentiality, integrity, authentication and access control among others.

In this paper, the loT vision, existing security threats and open challenges in the domain of loT discussed.  

Describe how the principles of confidentiality, integrity, and availability have their roots in formal modes for security specification. What is the essence of

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site