Verified Document

Concepts Of Availability Integrity And Confidentiality Essay

¶ … Confidentiality, Integrity, and Availability In the contemporary information systems environment, the security of organizational information resources is essential given an increase of hacker incidents globally. Data confidentiality is essential to ensure that the private information is not disclosed or made available to unauthorized individuals. On the other hand, the integrity is the part of information security that ensures that program and data are exchanged only by an authorized person. The system integrity assures that the system performs its intended functions without its inadvertent manipulation. The availability assures that the systems perform its intended function, and it does not deny its availability to the authorized user. These three security concepts (Integrity, Confidentiality, and Availability) is referred as Triad that performs fundamental security objectives for organizational information systems.

The objective of this paper is to explore the three concepts of information security.

The CIA Triad

The confidentiality can only be attained when an organization is able to achieve a restriction on information disclosures and access. Moreover, confidentiality involves protecting the proprietary information to enhance the personal privacy. Moreover, the integrity involves guiding against improper destruction or modification of information to ensure the authenticity of the information. A loss of integrity can lead to the destruction of information...

Parts of this document are hidden

View Full Document
svg-one

Additionally, the concept availability ensures a reliable and timely access to the use of information, and a loss of availability can lead to a destruction of the organizational information infrastructures. (Kim, & Solomon, 2014).
An example of confidentiality is the privacy of the student's grade information. In the United States, the student grade information is an asset and its confidentiality is very important to the student. The law regulates a release of such information to the public, and the regulation stipulates that the information should only be released to the students, employees, or parent. Moreover, organizations are required to protect the employee and customer's data from unauthorized access. In the United States, the sensitive data of several companies have been compromised by the hackers and sensitive data have been stolen eroding the concept of integrity, confidentiality and availability accorded to the data.

Seven Domains IT Infrastructures

A protection of the IT infrastructures is very critical to enhancing availability, integrity and availability of the data. The seven domains of IT infrastructures as follows:

1. User domain

2. Workstation Domain

3. LAN Domain

4. LAN-to-WAN Domain

5. Remote Access Domain

6. WAN Domain, and

7. System/Application Domain.

User domain covers all users and people having the privileges to access…

Sources used in this document:
Reference

Kim, D., & Solomon, M. G. (2014). Fundamentals of information systems security (2nd Ed.). Burlington, MA: Jones & Bartlett Learning.
Cite this Document:
Copy Bibliography Citation

Related Documents

Confidentiality of Sources Whether or
Words: 1619 Length: 5 Document Type: Thesis

Moreover, not all states have shield laws. The states that do have such laws are Alabama, Alaska, Arizona, Arkansas, California, Colorado, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Maryland, Michigan, Minnesota, Montana, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, Tennessee, and the District of Columbia. Each of these states defines and applies a journalist's privilege differently.

Confidentiality, Informed Consent, Competence and
Words: 1118 Length: 4 Document Type: Term Paper

C). AAPC Code of Ethics is shorter compared to ACA's, centering more on specific issues such as confidentiality and professional practices, among others. Identified as Principle IV in the AAPC code of ethics, Confidentiality is synonymously identified as 'respect for the integrity and protection of the welfare' of its clients, a claim that is similar to ACA's stance on confidentiality. ACA and AAPC discussed the issue of confidentiality similarly, although AAPC

Confidentiality in Healthcare One of
Words: 970 Length: 3 Document Type: Term Paper

Concomitantly, the patient should also be kept informed of such actions, as it directly affects his or her confidentiality status. The physician should then advise the patient regarding the necessary actions or allowance to be made for the destruction of the records. 6. As mentioned above, it is absolutely vital to identify individuals and organizations with access to the databases containing his or her medical records. The reason for this

Confidentiality for a Police Psychologist
Words: 1192 Length: 4 Document Type: Essay

Question Three The most important thing that a police psychologist should do when evaluating an officer for a position on the SWAT team is to inform that individual that the information that the officer reveals to the psychologist (and any conclusions that the psychologist comes to) will be shared with the officer's superiors for the purpose of determining if the officer can join the SWAT team. The psychologist is bound to

Confidentiality, Integrity and Professionalism in
Words: 2826 Length: 10 Document Type: Term Paper

The client is then hesitant to sue over a breach of trust because the client feels bonded to the therapist and does not want to hurt the therapist by suing. Another issue with confidentiality breaching is that the client has revealed secrets to the therapist and may be concerned that a lawsuit will cause those secrets to become part of public record or be testified about on the stand (Grabois,

Confidentiality Breaches & Informed Consent when Testing New Drugs...
Words: 2871 Length: 9 Document Type: Essay

Confidentiality Breaches in Clinical Practice The confidentiality and privacy of patients are considered as one of the fundamental freedoms that they should enjoy and are safeguarded under Health Insurance Portability and Accountability Act of 1996 (HIPPA). It is also a precept of the American Medical Association’s Code of Ethics and the Hippocratic Oath. The breach of confidentiality is unethical and illegal. Medical professionals are under the obligation of protecting the patient’s confidentiality.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now