Implementation of the CIA Triad
Information security within the organization revolves around the CIA triad component, an abbreviation for confidentiality, integrity, and availability. In this regard, confidentiality refers to the efforts undertaken by an organization to store data and prevent pilferage safely. This objective can only be attained when the access to information is under strict control through the prevention of sharing data with unauthorized parties. Parties that do not have proper privileges are exempted from accessing significant assets belonging to the organization (Deepika & Perumal, 2013). On the other hand, integrity focuses on ensuring an organization’s data is truthful and does not include any form of infiltration. The authenticity and accuracy aspects are vital in maintaining the integrity of a firm’s data. The lack of data integrity permits hackers to bypass the already established detection system, change file configurations, and change the logs maintained on the system to hide the trace of the attack (Deepika & Perumal, 2013). Lastly, availability denotes that the confidential information held by the organization is available to employees and aids in the service of employees. This paper will discuss how components of the CIA triad apply in organizational settings concerning symmetric and hashing algorithms.
One of the ways through which components of the CIA triad can be implemented in a profit-making business is through the adoption of the symmetric algorithm. The symmetric algorithm is an algorithm that requires both parties (senders and recipients) of the encrypted information to possess similar keys as well as processing algorithms. The key generated by a symmetric algorithm is also identified as a secret key or private key (Chitadze, 2023). If this crucial is not traceable, the security of an organization’s system hangs on the line. One of the common standards under this algorithm is the data encryption standard (DES), which is widely used in government parastatals and entities.
However, DES has now been deemed insecure because of the small size of its key. While DES generates a 64-bit key, eight out of these bits perform the role of error correction, while the remaining are the only actual ones. The other standard for consideration within this symmetric algorithm example is the triple-DES, identified as an upgrade of DES. 3DES is still being used today because it has proven to be considerably more challenging to break than other systems (Deepika & Perumal, 2013). The threat being addressed by triple-DES is that it prevents the system from overcoming the problem of a shorter key. For instance, the length of the key is increased to 168 bits through three 56-bit DES keys.
The hashing algorithm is another example of how components of the CIA triad can be implemented within the organization. Hashing is a process that guarantees the integrity of the message within the organization. Under normal circumstances, the hash is often generated and executed at the tail end of the message. Upon receiving the notification, the party then calculates the hash of the information and compares it to the hash received. If there were some infiltration on the statement along transit, the hashes would vary slightly (Chitadze, 2023). There are three broad attributes that a hash function must satisfy for it to be executable.
One of these characteristics is that a hash must be one-way in that after the message has been hashed, there is no way a user can un-hash it. The other attribute is that adopting a variable-length input may be realized to cause fixed-length output. This has been proven to be the case irrespective of whether the user hashing two or two million characters at a go. The last important attribute of a hash function is that the algorithm must have few or no collisions (Chitadze, 2023). This attribute applies because when two different inputs are hashed, there is no way a similar output would be obtained.
References
Chitadze, N. (2023). Basic principles of information and cyber security. In Analyzing New Forms of Social Disorders in Modern Virtual Environments (pp. 193–223). https://doi.org/10.4018/978-1-6684-5760-3.ch009
Deepika, S., & Perumal, P. (2013). Ensuring CIA triad for user data using a collaborative filtering mechanism. 2013 international conference on information communication and embedded systems (ICICES). 925–928. http://dx.doi.org/10.1109/ICICES.2013.6508262
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Research to find two examples of how each of the components of the CIA Triad is implemented for an organization, such as a business, non-profit, or trade association. For each example, identify the threat being addressed, the potential harm, and its benefit to the organization.
Paper Required Elements:
Your research paper must exhibit or contain the following content, formatting, and reference elements:
• General formatting reference: http://www.easybib.com/guides/citation-guides/apa-format/
. Cover page: must include the title of the paper, a running header, your name, and in place of the institution name enter the course number. • Table of contents: Not required
Discussion: At least 300 words in length, but not more than 750 words.
• Format: APA standard page layout and spacing. Citations: APA standard citation format. At least two topical references.