Document1 Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt Comprehension 25% Demonstrated a sophisticated understanding of the topic and relevant concepts. Demonstrated an...

1 answer below »
CIA is the underlying concept of providing uninterrupted, continuous and reliable access to information resources. Critically examine the CIA concept identifying the strengths and weaknesses of it and compare and contrast it against other similar models.


Document1 Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt Comprehension 25% Demonstrated a sophisticated understanding of the topic and relevant concepts. Demonstrated an advanced understanding of the topic and relevant concepts. Demonstrated a clear understanding of the topic and relevant concepts. Demonstrated sum understanding of the topic and relevant concepts. Demonstrated a limited understanding of the topic and relevant concepts. Demonstrates no understanding of the topic or relevant concepts. Argument 25% Expresses a logical and highly persuasive argument supported by appropriate literature. Argument utilises and integrates an extensive number of sources. Expresses a logical and persuasive argument supported by appropriate literature. Argument utilises and integrates a large number of sources. Expresses an effective argument supported by appropriate literature. Argument utilises and integrates an appropriate number of sources. Expresses an argument supported by appropriate literature. Argument utilises and integrates a limited number of sources. Describes the content of the article without critique. May make some reference to other sources. Limited attempt to describe an article and/or makes no reference to other sources. Structure 20% Logical and cohesive structure. Elegant progression between the substantive points made. There are highly effective links within and across paragraphs. Logical and coherent structure. Effective progression between the substantive points made. There are clear links within and across paragraphs. Coherent structure. Points are generally organised into paragraphs with some attempt to link ideas. Some paragraphs may be fragmentary or overly long. Clear attempt at structuring points. The links between paragraphs may be unclear or illogical. Paragraphs may be fragmentary or inconsistent in their presentation of ideas. Limited attempt at structuring points. The response lacks a delineated approach to the material presented. No discernible attempt to structure points. The structure may be convoluted, repetitive and/or incoherent. Expression 20% Clear, precise and elegant writing style. Very few (if any) grammatical errors. Clear and precise writing style. Minimal grammatical errors. Clear writing style. Some grammatical errors may be present. Satisfactory writing style. Poor expression may impact the clarity of the ideas expressed. Unsatisfactory written expression. Grammatical errors result in a lack of clarity and coherence. Numerous grammatical errors and little to no evidence of proofreading. References 10% Follows required referencing style with no errors. Follows required referencing style with minimal errors. Follows required referencing style with some errors. Follows required referencing style with errors. Follows incorrect referencing style or significant errors. No referencing used.
Answered Same DayOct 24, 2021

Answer To: Document1 Topic Weight Excellent Very Good Good Satisfactory Unsatisfactory No Attempt Comprehension...

Taruna answered on Oct 25 2021
148 Votes
Introduction
    The analysis covers the principles of the CIA that help to provide uninterrupted and reliable access to information services. The CIA is one of the independent organizations responsible for supplying US policy makers with national security intelligence. The appointments are carried out with the advice and consent of the Senate, where the operations, budget and staff are handled. Thus, the structural understanding of CIA is more like an agency that has ful
l control of the government and it is subjected to offer services at their command and disposal (Galanc et al, 2016).
The CIA is using the US government's main foreign intelligence to handle the FBI's counterintelligence activities. In modern context, the challenges of CIA to function as the investigation agency have been expanded; the roles and responsibilities have dramatically evolved over the past two decades due to the rise of technology and the process through which, various threats keep on surging out of nowhere in United States. A major section of CIA now remains involved in seeking information, collection of evidences as well as to work as the collation agency with the other entities like DHS and FBI. The process of the information resource management ensures that the roles and responsibilities of CIA are going to expand as per the consistent evolution of technology.
The Conceptual Understanding of CIA
    At first, it is significant to note here that the structural understanding of CIA leads to the points that it is exclusively made by keeping in mind the aspects of confidentiality, integrity and availability of services to the nation (Agrell, 2002). This three folded structure of the agency can be interpreted by taking confidentiality on priority. Confidentiality drives the guarantee that only approved persons have access to the data and the information system. Some of the effective methods for confidentiality are the user ID and the password with access control lists or policy-based protection (Galanic et al, 2016).
This security level ensures that the preservation of all data stored in the agency servers as well as in the records of the investigating officers is well safe. Second, integrity is designed to ensure that data and knowledge can be trusted easily. It ensures that the editing is achieved by approving individuals and then managing the data encryption algorithms that are the main mechanism for the various standards of integrity. It is more like keeping the data accounts safe and secure as well as easy to understand. Finally, Availability highlights the information and information where data availability depends on hardware maintenance and software patching or network optimization updating that ensures accessibility (Walkowski, 2018).
Merits and Demerits of CIA
    The CIA’s Cybersecurity strengths include privacy safeguards where confidentiality is guaranteed to prevent any information that is sensitive from reaching the wrong people. It helps to access information that must be limited to those who are allowed to display the information in question. It is normal for data sectors to be classified according to the amount and form of damage that may fall under unintended hands. Steps must be taken to include strict categories in order to safeguard the confidentiality of the data, which requires special training for those who are privy to such documents (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002).
    It is implied from the above that the security and safeguarding process of CIA is crucial and precise in the sense that it takes up only those professionals who are dedicated to their work and have clear objectives about keeping the information resources secure. It is important to review this policy of CIA to recruit only the top professionals within the industry; there is a high level of security threats that the agency has to deal with in the modern context and it is necessary that the agency has the best skilled people to handle the security measures (Peterson et al, 2016; Galnc et al, 2009; Agrell, 2002). At the same time, it is important for the agency to ensure that the data processing s private and it is kept within the reach of the agency server only. It enhances the role of confidentiality as one of the major structural components of CIA.
    Moreover, what makes this confidentiality and prevention programs at CIA significant are the aspect of threat received by the information sources these days. Cybersecurity is one of the major issues that is seen of national interest especially for the government agencies like CIA, FBI or DHS. While making an investigation possible, a wide range of data has been collected and processed. This data is sensitive by nature because...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here