hey please assign writer 63564 and 62922 as they had the most experience in the unit- sent reference guide please check it out(ALSO WILL SEND MARKING RUBRIC SOON SO PLEASE FOLLOW HIGH DISTINCTION...

1 answer below »

View more »
Answered Same DaySep 14, 2021PICT3011Macquaire University

Answer To: hey please assign writer 63564 and 62922 as they had the most experience in the unit- sent reference...

Dilpreet answered on Oct 20 2021
143 Votes
CRITICAL ANALYSIS OF THE CONCEPT OF CIA
Table of Contents
Introduction    3
Concept of CIA    3
Strength and weakness associated with the model of CIA    4
Name and implication of other relative models with CIA    6
Comparison and contrast of CIA with another relevant model (MSR model of Information Assurance)    8
Recommendation and Conclusion    9
References    10
Introduction
CIA is a triangular-shaped information security model specially designed to deal with data insecurity and cyber threats in any business organization. The term CIA is associated with the security and the infrastructure of an organization in
functioning and making operation to the goal selection, objective development of a company. Three individual letters in the triad CIA mean confidentiality for C, Integrity for availability and me for A. These factors ensure stability and sustenance in an organization by influencing service operations, functional incredibility, and enhancing integrity associating dealing excellence. CIA further helps in making people aware of the information security policies that are prevailed within an organization. To avoid confusion with the Central Intelligence Agency that is CIA, the term is sometimes addressed as AIC, defining availability, integrity, and confidentiality as the core of an organization. Hence, the paper is depicted to critically analyze the CIA model by comparing and contrasting its strength and weakness to that of the other relevant models.
Concept of CIA
The CIA model helps to ensure the categorization of data as well as the assets being handled and well managed as per the maintenance of privacy requirements. Furthermore, personalized data, such as online banking passwords and relative details are protected by procuring data encryption as a basic requirement implied with the help of the CIA (Mann et al. 2020). Two-factor authentication enables customers to remain safe with the protection of their potential data as assessed by the CIA as the basic security hygiene. Moreover, the CIA helps in ensuring the access to control lists, manage to enable file permission.
The white files, as basic security measures by organizations for the safety of their customers, are meant to monitor and update regularly as an inevitable measure to procure rights. The CIA helps in arresting the risks associated with cybercrimes like data hacking, data leakage, ransom ware, internal threat, and phishing. Since 1998, this triangular model, the CIA has been used to maintain the three distinctive parameters of security being potential risk management as well as information management model (Taveau et al., 2020). Donn Parker, being the inventor of this model, has proposed for an additional three more stage elements to the existing framework of the model.
The CIA ensures the confidentiality of data, such as, by implication of data encryption, it ensures confidentiality and privacy of passwords in a bank account. Several organizations, for the fact of authenticity, have incorporated two-factor authentications as the norm. The incorporation of biometric verification, key fobs, soft tokens, security tokens are enormously being practiced by several organizations, which are the implications of the CIA (Smithson et al., 2017). Biometric verification entry implication in an organization will ensure the entry of any trespasser and finally affecting no loss by an intruder. The fact of integrity redefines the ongoing security system of an organization by enabling file permission and access control.
The term availability is associated with the maintenance of hardware that has been used in storing sensitive data to avoid misleading the data and manage the risk of cybercrime. In terms of ensuring data integrity in an organization, CIA implications help in bringing compliance as well as regulatory requirements by associating and enabling version control, data logs, and checksums. Furthermore, to ensure data availability, Data Recovery, and Business Continuity Plan is a common implication based on the CIA model (Bartikoski et al., 2020). The CIA model also implies regular monitoring and regularization in arresting cyber weapons, cyber threats, and negotiating threats of intelligence for an organization.
Strength and weakness associated with the model of CIA
Strengths of the CIA:
CIA helps in reducing sniffing of network traffic, which is considered as a potential reason for disturbing confidentiality. Protecting confidentiality in a public dealing sector is highly important for the sustainability of that organization and the public security of a large number of people too. The implication of the CIA model has enabled several public service organizations like banks, communication agencies, and consultancy to procure data of the customers. This ensured long-term relations with customers, managed stability, enabled the organization to incorporate dealing magnificence, and enabled operational efficacy (Nweke, 2017). Therefore, the CIA has been able in strengthening the functional efficacy of an organization by enlarging the integrity of its operations.
The easy management of data, proper source of document keeping, securing data by individualizing source for keeping and maintaining a track of that, deleting the data permanently which may not be required or have not been in use for the last fifty years are all implications of CIA. This step helps in managing compliance and getting rid of unnecessary crime hassles about those obsolete data. Furthermore, it has enabled free up space too, which in terms helped in increasing efficiency in finding data easily as a result of the increasing data speed (Ruelas et al., 2020).
The weakness of the CIA:
The prime weakness of the CIA triad lies in its sole focus on the sources and types of information. However, information is the main consideration for IT security; still, it hides some other important factors to deal with IT threats or crimes as topmost priority are given to deal with information only. In terms of regular monitoring of data, the CIA follows a detailed process that is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30