Risk Management Framework and CIA

Document Type:Essay

Subject Area:Technology

Document 1

Information technology if left without valid safeguards, harm may befall the users of the systems or laid-down frameworks. CIA is a way that shows measures in addressing information security. It is a crucial step for individuals as well as organizations to safeguard their information across the available digital platforms. The CIA encompasses various goals that are deemed ideal to achieve when trying to ensure information security, and they are: availability, confidentiality and integrity. Confidentiality demands barring information from being accessed by unauthorized people or entities. Finally,disk optimization should be done Viruses, Malware, Worms, Trojan Horse, Etc. Confidentiality, integrity & availability These are malicious applications that replicate and execute themselves in the nodes of information houses. To prevent this kind of threat, firewalls and antiviruses should effectively be implemented.

Sign up to view the full document!

Data should also sanitize and screened before being downloaded to the information warehouses. Frequent scanning of the host storage locations to check for malicious activities from applications. Financial budget should be made and cost of providing a meddle-proof network ascertained beforehand so that owners of the system begin the groundwork for its implementation. A company would in its best interest seek to understand the benefits vs. costs to be incurred for putting suitable measures to insulate themselves against information breach (Paquet, 2013). A firm should not have to overstretch itself financially so as to be able to secure its systems. In addition, data processed within a company would have to be classified depending on its importance as well as sensitivity. com/the-cia-triad-confidentiality-integrity- availability.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable