Answer To: Document1 Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt Comprehension...
Taruna answered on Oct 25 2021
Introduction
The analysis covers the principles of the CIA that help to provide uninterrupted and reliable access to information services. The CIA is one of the independent organizations responsible for supplying US policy makers with national security intelligence. The appointments are carried out with the advice and consent of the Senate, where the operations, budget and staff are handled. Thus, the structural understanding of CIA is more like an agency that has full control of the government and it is subjected to offer services at their command and disposal (Galanc et al, 2016).
The CIA is using the US government's main foreign intelligence to handle the FBI's counterintelligence activities. In modern context, the challenges of CIA to function as the investigation agency have been expanded; the roles and responsibilities have dramatically evolved over the past two decades due to the rise of technology and the process through which, various threats keep on surging out of nowhere in United States. A major section of CIA now remains involved in seeking information, collection of evidences as well as to work as the collation agency with the other entities like DHS and FBI. The process of the information resource management ensures that the roles and responsibilities of CIA are going to expand as per the consistent evolution of technology.
The Conceptual Understanding of CIA
At first, it is significant to note here that the structural understanding of CIA leads to the points that it is exclusively made by keeping in mind the aspects of confidentiality, integrity and availability of services to the nation (Agrell, 2002). This three folded structure of the agency can be interpreted by taking confidentiality on priority. Confidentiality drives the guarantee that only approved persons have access to the data and the information system. Some of the effective methods for confidentiality are the user ID and the password with access control lists or policy-based protection (Galanic et al, 2016).
This security level ensures that the preservation of all data stored in the agency servers as well as in the records of the investigating officers is well safe. Second, integrity is designed to ensure that data and knowledge can be trusted easily. It ensures that the editing is achieved by approving individuals and then managing the data encryption algorithms that are the main mechanism for the various standards of integrity. It is more like keeping the data accounts safe and secure as well as easy to understand. Finally, Availability highlights the information and information where data availability depends on hardware maintenance and software patching or network optimization updating that ensures accessibility (Walkowski, 2018).
Merits and Demerits of CIA
The CIA’s Cybersecurity strengths include privacy safeguards where confidentiality is guaranteed to prevent any information that is sensitive from reaching the wrong people. It helps to access information that must be limited to those who are allowed to display the information in question. It is normal for data sectors to be classified according to the amount and form of damage that may fall under unintended hands. Steps must be taken to include strict categories in order to safeguard the confidentiality of the data, which requires special training for those who are privy to such documents (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002).
It is implied from the above that the security and safeguarding process of CIA is crucial and precise in the sense that it takes up only those professionals who are dedicated to their work and have clear objectives about keeping the information resources secure. It is important to review this policy of CIA to recruit only the top professionals within the industry; there is a high level of security threats that the agency has to deal with in the modern context and it is necessary that the agency has the best skilled people to handle the security measures (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002). At the same time, it is important for the agency to ensure that the data processing s private and it is kept within the reach of the agency server only. It enhances the role of confidentiality as one of the major structural components of CIA.
Moreover, what makes this confidentiality and prevention programs at CIA significant are the aspect of threat received by the information sources these days. Cybersecurity is one of the major issues that is seen of national interest especially for the government agencies like CIA, FBI or DHS. While making an investigation possible, a wide range of data has been collected and processed. This data is sensitive by nature because...