Page 7
To understand InfoSec one has to know how the C.I.A. triangle plays a part in it, the features are confidentiality, integrity, and availability, while looking at security technology it would seem like these three components are insufficient as a single part due to their limits in the ever changing IT environment their scopes are limited the needs in the IT field requires a more robust design. The development of the C.I.A. triangle is now a list of wide-range features and procedures that are vital, which covers privacy, identification authentication authorization, and accountability. The three discussed in this paper will be availability, confidentiality, and integrity (Whitman & Mattord, 2014).
As the management of information security becomes vital and the circumstances are that there is no way to simply view information security, individuals must know how to handle the different issues when it comes to information security. The compromises that could pose a threat to government and enterprises can come from natural disasters, technical possibilities and human-associated risk rather intentionally or not. Ensuring that this data is safeguarded consist of maintaining the …show more content…
triangle is positioned on layer one of the TISA trusted layers, the confidentiality
(de Oliveira Albuquerque, García Villalba, Sandoval Orozco, Buiati, & Tai-Hoon, 2014).
References
Whitman, M. E., & Mattord, H. J. (2014). Management of information security (4th ed.). Boston, MA: Cengage.
de Oliveira Albuquerque, R., García Villalba, L. J., Sandoval Orozco, A. L., Buiati, F., & Tai-Hoon, K. (2014). A Layered Trust Information Security Architecture. Sensors (14248220), 14(12), 22754-22772. doi:10.3390/s141222754
Katzenstein, W., Martin, T., & Vrable, M. (2004). Making the CIA Work for You. UMAP Journal, 25(2),