IndexIntroductionConfidentialityIntegrityAvailabilityIntroductionThere are three fundamental elements that cryptography and encryption attempt to protect and preserve and are often referred to as the CIA triad. Please identify and describe each of the three elements of the CIA triad and provide a real-life example (may be hypothetical or real) of how cryptography and encryption can be applied. CIA, called Confidentiality, Integrity and Availability, is a representation designed to protect data security policies within a company. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Confidentiality is a set of rules that control access to data, integrity is the guarantee that data is reliable or reliable and realistic, and availability is a guarantee of reliable approach to data by accredited persons . Confidentiality Confidentiality is suddenly the same as privacy. Measures taken to ensure confidentiality and these are taken to prevent sensitive information from reaching unwanted people. Approximately stringent measures are adopted that can be implemented based on these categories. Access can be limited to those who are authorized to view the information, and data can also be classified based on the type of damage that could be caused if it were to fall into unintended hands. An example of a method used to ensure confidentiality is an account number or routing number when banking online. Data encryption is a type of method to ensure understanding. Other options include security keys and biometric verification. User confidentiality is standard procedure; two-factor authentication is becoming normal. Integrity Integrity mainly maintains few things like accuracy, consistency and reliability of data throughout its entire life cycle. During transit, the data should not be modified and strict rules should be followed to ensure that the information cannot be modified by unauthorized or unaccredited persons, we can say that a breach of confidentiality includes user access controls and permissions of the files. Examples of this integrity are version checking could be used to prevent erroneous modifications or unexpected deletions by unauthorized users from becoming an obstacle. Sometimes to detect any changes in data that may occur as a result of non-human-caused events such as electromagnetic pulses or server crashes and also cryptographic checksums for integrity checks. Availability Availability is the main guarantee by maintaining all the hardware and when required, also performs repairs of the hardware and maintains a well-functioning operating system which should be free of software conflicts. Protections against interruptions or loss of information in connections and these include some events such as fires and natural disasters. Solution to prevent data loss due to unpredictable situations, a backup copy could be stored in a geographically isolated location, perhaps even in a waterproof and fireproof safe. Security software includes proxy servers and firewalls that can protect against unreachable information such as DOS (Denial Of Service) and intrusions into a network. One of the challenges: “Internet of Things security” is also a special challenge because the IoT includes so many Internet-enabled devices other than computers, which are often configured with default or weak passwords and also have no equal. If not adequately.
tags