By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 586 |
Page: 1|
3 min read
Published: Dec 5, 2018
Words: 586|Page: 1|3 min read
Published: Dec 5, 2018
There are three core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad. Please identify and describe each of the three elements of the CIA Triad and provide a real-world example (it can be hypothetical or real) of how cryptography and encryption can be applied. CIA referred to as Confidentiality, Integrity, and Availability, It is a representation designed to protect policies for data security within a firm.
Confidentiality is a set of regulations that control access to the data, integrity is the guarantee that the data is reliable or trustworthy and realistic, and Availability is an assurance of trustworthy approach to the data by accredited people.
Confidentiality is abruptly identical to privacy. Measures undertaken to assure confidentiality and these are made to prevent sensitive information from reaching the unwanted people. Approximately, Stringent measures are taken, that can be implemented according to those categories. Access can be confined for those who authorized to view the information and also for data can be classified according to the type of damage that could be done must fall into unintended hands.
Example of a method used to ensure confidentiality is an account number or routing number when making online banking. Data encryption is a type of method of ensuring understanding. Other options include Security Tokens and Biometric Verification. User confidential constitute a standard procedure; two-factor authentication becoming normal.
Integrity mainly maintains the few things like accuracy, consistency, and reliability of data over its entire lifecycle. In transit, data must not be changed and severe rules should be followed to guarantee that the information cannot be modified by unauthorized or unaccredited people, we can say in a breach of confidentiality includes user access controls and file permissions.
Examples of this integrity are version control might be utilized to avoid erroneous modifications or unexpected deletion by unauthorized users becoming an obstacle. Sometimes to detect any changes in data that may occur as an output of non-human caused events like electromagnetic pulse or server crash and also even cryptographic checksums for verifications of integrity.
Availability is the foremost ensure by maintaining all hardware and when required it also performs hardware repairs and maintains a well functioning operating system that should be free of software conflicts. Safeguards against interruptions or loss of information in connections and these include some events like fire and natural disasters. Solution to prevent data loss from unpredictable situations, a backup copy might be stored in a geographically isolated location, maybe even in a waterproof, fireproof safe. Security software includes proxy servers and firewalls can guard against unreachable information such as DOS(Denial Of Service) and intrusions of a network.
One of the Challenges:” Internet of Things security” is also a special challenge because the IoT comprises of so many Internet-enabled devices other than computers, Which often configured with default or weak passwords and also go unmatched. Unless adequately protected, IoT things could be used as separate attack vectors. For example, researchers demonstrated that a network could be compromised through a Wi-Fi-enabled light bulb.
In December 2013, an enterprise security firm, a researcher at Proofpoint discovered that hundreds of thousands of spam emails were being logged through a security gateway. Proofpoint traced the attacks to a botnet made up of 100,000 hacked appliances. As more and more products are developed with the capacity to be networked, it’s important to routinely consider security in product development.
Browse our vast selection of original essay samples, each expertly formatted and styled