CIA Triad: Choose one of the areas of the CIA Triad, i.e., Confidentiality, Integrity, or Availability. Describe that area and provide one real-world example of a breach of that area chosen and what c

Collapse

Top of Form

The CIA Triad.

            The CIA Triad is a model used in the development of policies associated with information security after problem identification in an organization. CIA represents three vital principles; confidentiality, integrity, and availability that are essential for a system to be termed secure (Guhan et al. 2018). The CIA principle is concerned with security analysis ranging from the user’s accessed internet history to how the encrypted data is secured. A breach of any of the three causes severe consequences to the concerned parties. I will discuss confidentiality as an area in the CIA.

            Confidentiality is a set of created rules that protects the information of a user by hiding it from unauthorized people. In matters concerning security, this is a core area of focus. Nevertheless, the confidentiality area is always the most vulnerable to attackers. An example of a breach of confidentiality happened on January 11, 2019, when the Managed Health Services of Indiana exposed 31,000 patients’ personal health information due to a phishing attack. The confidential information that was lost included medical conditions, dates of birth, insurance ID numbers, and names.

            Addressing breach in confidentiality, I would choose two major countermeasures, i.e., encryption of data files, Unix file permission, cloud storage, and cryptography. In this case, physical devices that stored data were broken into. The first countermeasure would be the storage of sensitive and confidential information to the cloud. Having a secure cloud service will guarantee safe storage of information (Shen et al. 2018). Secondly, the encryption of data files using either asymmetric, symmetric, or hash method will create a secure channel of information exchange and safer storage devices. Using Unix file permission will enable restricted access to specific folders and files to specific users; hence an outsider cannot have access to the data. Lastly, Cho et al. (2018) explain that cryptography will be essential in storing the information that is in plain text to unintelligible text making it secure to outsiders.

 

References

Cho, S. N., Jeong, Y. S., & Oh, C. (2018). An Efficient cryptography for healthcare data in the    cloud environment. Journal of Convergence for Information Technology8(3), 63-69.

Guhan, S., Arumugham, S., Janakiraman, S., Rengarajan, A., & Rajagopalan, S. (2018, May). A Trio Approach Satisfying CIA Triad for Medical Image Security. In International         Conference on ISMAC in Computational Vision and Bio-Engineering (pp. 1109-1121).          Springer, Cham.

Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity-based integrity auditing and            data sharing with sensitive information hiding for secure cloud storage. IEEE    Transactions on Information Forensics and Security14(2), 331-346.

Bottom of Form