hey please assign writer 63564 and 62922 as they had the most experience in the unit- sent reference guide please check it out(ALSO WILL SEND MARKING RUBRIC SOON SO PLEASE FOLLOW HIGH DISTINCTION...

1 answer below »
hey please assign writer 63564 and 62922 as they had the most experience in the unit- sent reference guide please check it out(ALSO WILL SEND MARKING RUBRIC SOON SO PLEASE FOLLOW HIGH DISTINCTION AISLE and tick off every thing they need please )

Question


CIA is the underlying concept of providing uninterrupted, continuous and reliable access to information resources. Critically examine the CIA concept identifying the strengths and weaknesses of it and compare and contrast it against other similar models.



Details



  • Word limit is 2,500 (± 10%) (includes titles and references but NOT bibliography)

  • Sage Harvard referencing

  • Refer to unit guide for formatting guidelines (12 point font with 1.5 line spacing)

  • Late penalties apply for submissions after the deadline - 2% of the maximum marks per day (or part thereof). Submissions later than 7 days will not be accepted

  • You will not be able toresubmitafter the deadline, resubmissions prior to the deadline are allowed

  • Trust but verify-after you submit, make sure you submitted the correct file




Untitled SAGE UK Style Guide 17 6.1 SAGE Harvard 1. General 1. Initials should be used without spaces or full points. 2. Up to three authors may be listed. If more are provided, then list the first three authors and represent the rest by et al. Fewer authors followed by et al. is also acceptable. 2. Text citations 1. All references in the text and notes must be specified by the authors’ last names and date of publication together with page numbers if given. 2. Do not use ibid., op. cit., infra., supra. Instead, show the subsequent citation of the same source in the same way as the first. 3. Where et al. is used in textual citations, this should always be upright, not italic. Note the following for the style of text citations: 1. If the author’s name is in the text, follow with year in parentheses: ... Author Last Name (year) has argued ... 2. If author’s name is not in the text, insert last name, comma and year: ... several works (Author Last Name, year) have described ... 3. Where appropriate, the page number follows the year, separated by a colon: ... it has been noted (Author Last Name, year: page nos) that ... 4. Where there are two authors, give both names, joined by ‘and’; if three or more authors, use et al.: ... it has been stated (Author Last Name and Author Last Name, year) ... ... some investigators (Author Last Name et al., year) ... 5. If there is more than one reference to the same author and year, insert a, b, etc. in both the text and the list: ... it was described (Author Last Name, yeara, yearb) ... 6. Enclose within a single pair of parentheses a series of references, separated by semicolons: ... and it has been noted (Author Last Name and Author Last Name, year; Author Last Name and Author Last Name, year; Author Last Name, year) ... Please order alphabetically by author names. 7. If two or more references by the same author are cited together, separate the dates with a comma: ... the author has stated this in several studies (Author Last Name, year, year, year, year) ... Please start with the oldest publication. 8. Enclose within the parentheses any brief phrase associated with the reference: ... several investigators have claimed this (but see Author Last Name, year: page nos–page nos) 9. For an institutional authorship, supply the minimum citation from the beginning of the complete reference: ... a recent statement (Name of Institution, year: page nos) ... ... occupational data (Name of Bureau or Institution, year: page nos) reveal ... 10. For authorless articles or studies, use the name of the magazine, journal, newspaper or sponsoring organization, and not the title of the article: ... it was stated (Name of Journal, year) that ... 11. Citations from personal communications are not included in the reference list: ... has been hypothesized (Name of Person Cited, year, personal communication). SAGE UK Style Guide 18 3. Reference list 1. Check that the list is in alphabetical order (treat Mc as Mac). 2. Names should be in upper and lower case. 3. Where several references have the same author(s), do not use ditto marks or em dashes; the name must be repeated each time. 4. Last Names containing de, van, von, De, Van, Von, de la, etc. should be listed under D and V respectively. List them as: De Roux DP and not Roux DP, de. When cited in the main text without the first name, use capitals for De, Van, Von, De la, etc. (Van Dijk, year) 5. Names containing Jr or II should be listed as follows: • Author Last Name Initial Jr (year) • Author Last Name Initial II (year) 6. References where the first-named author is the same should be listed as follows: • Single-author references in date order; • Two-author references in alphabetical order according to the second author’s name; • Et al. references in alphabetical order; in the event of more than one entry having the same date, they should be placed in alphabetical order of second (or third) author, and a, b, etc. must be inserted. Brown J (2003) Brown TR and Yates P (2003) Brown W (2002) Brown W (2003a) Brown W (2003b) Brown W and Jones M (2003) Brown W and Peters P (2003) Brown W, Hughes J and Kent T (2003a) Brown W, Kent T and Lewis S (2003b) 7. Check that all periodical data are included – volume, issue and page numbers, publisher, place of publication, etc. 8. Journal titles should not be abbreviated in SAGE Harvard journal references 9. Where et al. is used in reference lists, it should always be upright, not italic. 4. Reference styles Book Clark JM and Hockey L (1979) Research for Nursing. Leeds: Dobson Publishers. Book chapter Gumley V (1988) Skin cancers. In: Tschudin V and Brown EB (eds) Nursing the Patient with Cancer. London: Hall House, pp.26–52. Journal article Huth EJ, King K and Lock S (1988) Uniform requirements for manuscripts submitted to biomedical journals. British Medical Journal 296(4): 401–405. Journal article published ahead of print Huth EJ, King K and Lock S (1988) Uniform requirements for manuscripts submitted to biomedical journals. British Medical Journal. Epub ahead of print 12 June 2011. DOI: 10.1177/09544327167940. Website National Center for Professional Certification (2002) Factors affecting organizational climate and retention. Available at: www.cwla.org./programmes/triechmann/2002fbwfiles (accessed 10 July 2010). Thesis/dissertation Clark JM (2001) Referencing style for journals. PhD Thesis, University of Leicester, UK. http://www.cwla.org./programmes/triechmann/2002fbwfiles SAGE UK Style Guide 19 Newspaper/magazine Clark JM (2006) Referencing style for journals. The Independent, 21 May, 10. Conference article (published or unpublished) Clark JM and Smith P (2002) Latest research on car exhaust manifolds. In: 17th international conference on strain analysis (ed L Macadam), London, UK, 23–25 September 2010, pp.12–14. London: Professional Engineering Publishing. Blog Clark JM (2006) Article title. In: Blog title. Available at: www.blogit.com/johnmatthewclark (accessed 20 August 2011). Report 1. MacDonald S (2008) The state of social welfare in the UK. Report, University of Durham, UK, June. 2. Citigroup Ltd. (2011) How to make your money work for you. Report for the Department of Finance. Report no. 123345, 13 June. Oxford: OUP. Package insert (medical etc.) 1. Eisai Inc. (2008) Aloxi (package insert). New York: Esai Inc. Standard 1. ISO 27799:2008 (2008) Information security management in health.
Answered Same DaySep 14, 2021PICT3011Macquaire University

Answer To: hey please assign writer 63564 and 62922 as they had the most experience in the unit- sent reference...

Dilpreet answered on Oct 20 2021
141 Votes
CRITICAL ANALYSIS OF THE CONCEPT OF CIA
Table of Contents
Introduction    3
Concept of CIA    3
Strength and weakness associated with the model of CIA    4
Name and implication of other relative models with CIA    6
Comparison and contrast of CIA with another relevant model (MSR model of Information Assurance)    8
Recommendation and Conclusion    9
References    10
Introduction
CIA is a triangular-shaped information security model specially designed to deal with data insecurity and cyber threats in any business organization. The term CIA is associated with the security and the infrastructure of an organization in
functioning and making operation to the goal selection, objective development of a company. Three individual letters in the triad CIA mean confidentiality for C, Integrity for availability and me for A. These factors ensure stability and sustenance in an organization by influencing service operations, functional incredibility, and enhancing integrity associating dealing excellence. CIA further helps in making people aware of the information security policies that are prevailed within an organization. To avoid confusion with the Central Intelligence Agency that is CIA, the term is sometimes addressed as AIC, defining availability, integrity, and confidentiality as the core of an organization. Hence, the paper is depicted to critically analyze the CIA model by comparing and contrasting its strength and weakness to that of the other relevant models.
Concept of CIA
The CIA model helps to ensure the categorization of data as well as the assets being handled and well managed as per the maintenance of privacy requirements. Furthermore, personalized data, such as online banking passwords and relative details are protected by procuring data encryption as a basic requirement implied with the help of the CIA (Mann et al. 2020). Two-factor authentication enables customers to remain safe with the protection of their potential data as assessed by the CIA as the basic security hygiene. Moreover, the CIA helps in ensuring the access to control lists, manage to enable file permission.
The white files, as basic security measures by organizations for the safety of their customers, are meant to monitor and update regularly as an inevitable measure to procure rights. The CIA helps in arresting the risks associated with cybercrimes like data hacking, data leakage, ransom ware, internal threat, and phishing. Since 1998, this triangular model, the CIA has been used to maintain the three distinctive parameters of security being potential risk management as well as information management model (Taveau et al., 2020). Donn Parker, being the inventor of this model, has proposed for an additional three more stage elements to the existing framework of the model.
The CIA ensures the confidentiality of data, such as, by implication of data encryption, it ensures confidentiality and privacy of passwords in a bank account. Several organizations, for the fact of authenticity, have incorporated two-factor authentications as the norm. The incorporation of biometric verification, key fobs, soft tokens, security tokens are enormously being practiced by several organizations, which are the implications of the CIA (Smithson et al., 2017). Biometric verification entry implication in an organization will ensure the entry of any trespasser and finally affecting no loss by an intruder. The fact of integrity redefines the ongoing security system of an organization by enabling file permission and access control.
The term availability is associated with the maintenance of hardware that has been used in storing sensitive data to avoid misleading the data and manage the risk of cybercrime. In terms of ensuring data integrity in an organization, CIA implications help in bringing compliance as well as regulatory requirements by associating and enabling version control, data logs, and checksums. Furthermore, to ensure data availability, Data Recovery, and Business Continuity Plan is a common implication based on the CIA model (Bartikoski et al., 2020). The CIA model also implies regular monitoring and regularization in arresting cyber weapons, cyber threats, and negotiating threats of intelligence for an organization.
Strength and weakness associated with the model of CIA
Strengths of the CIA:
CIA helps in reducing sniffing of network traffic, which is considered as a potential reason for disturbing confidentiality. Protecting confidentiality in a public dealing sector is highly important for the sustainability of that organization and the public security of a large number of people too. The implication of the CIA model has enabled several public service organizations like banks, communication agencies, and consultancy to procure data of the customers. This ensured long-term relations with customers, managed stability, enabled the organization to incorporate dealing magnificence, and enabled operational efficacy (Nweke, 2017). Therefore, the CIA has been able in strengthening the functional efficacy of an organization by enlarging the integrity of its operations.
The easy management of data, proper source of document keeping, securing data by individualizing source for keeping and maintaining a track of that, deleting the data permanently which may not be required or have not been in use for the last fifty years are all implications of CIA. This step helps in managing compliance and getting rid of unnecessary crime hassles about those obsolete data. Furthermore, it has enabled free up space too, which in terms helped in increasing efficiency in finding data easily as a result of the increasing data speed (Ruelas et al., 2020).
The weakness of the CIA:
The prime weakness of the CIA triad lies in its sole focus on the sources and types of information. However, information is the main consideration for IT security; still, it hides some other important factors to deal with IT threats or crimes as topmost priority are given to deal with information only. In terms of regular monitoring of data, the CIA follows a detailed process that is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here