Phase 1 IP
The CIA Triad was found to have vulnerabilities so the Expanded CIA Triad was created. This Expanded CIA Triad has seven different categories. I will be discussing these seven different categories, summarizing their security goals, and discuss how the goals can be accomplished with the use of software or hardware.
Availability permits authorized user whether person or computer systems to presence of data or systems at all times or whenever needed, without intrusion or impediment. Users are required to be able to access required and permitted data when needed by the users. The security goal for ...view middle of the document...
The goal of confidentiality is to safeguard restricted access. Only authorized users and systems are to be allowed to access the secure data that has been determined to detrimental to the users or systems. Confidentiality may be accomplished by the classifying of data and information, and implementing strict security policies.
Integrity is when data or information is whole, complete, uncorrupted; basically the data or information is without unnecessary changes or is not incomplete. The goal of integrity is to maintain complete data without any illegal data or information changes, modifications, or data or information corruption. Integrity can be accomplished by file hashing methods along with error correcting code software to provide the proper integrity of the data or information.
Utility is the quality or state of being of value for a purpose or end result. The goal of utility is to make proper use of information or data so that the data or information can serve a specific purpose toe the user or system that is using it. Without...