Preview

The AIC Triad

Good Essays
Open Document
Open Document
472 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The AIC Triad
The AIC Triad is an acronym that stands for Availability, Integrity, and Confidentiality; these are the three core principles when dealing with IT security. Availability is based on the concept of when a person wants the information that person able to have it and does not have to wait too long or the information is not destroyed. Integrity involves only who can edit the valuable information. Confidentiality is mainly the restrictions set upon who can actually see the information as well as who is allowed to modify or delete that information as well. Even though each of these principles are valuable to IT security, the most important one of them all is Confidentiality because there has to be a set limit to how much information a person is able to see when he/she is logged into a secure system. Confidentiality limits how much access a person has to certain information. For example, a janitor would not have as much access to the secret information of a company as say the IT specialist of that company. The most accurate way to ensure that the data has not been compromised is to set restrictions on every person that is hired into the business and only allow people to have access to the information that will …show more content…
According to article 1 Information Security and the CIA Triad by Mase Consulting, it states “sensitivity implies confidentiality” this means any sensitive or private data need to be secured with the principle of confidentiality. The article “The CIA Triad by Chad Perrin” speaks about how to protect the confidentiality of your information by stating, “Protecting confidentiality hinges upon defining and enforcing appropriate access levels for information”. In short if you do not make an effort to secure your information by setting restriction levels on your information then al your private data is up for

You May Also Find These Documents Helpful

  • Powerful Essays

    TranquilityDaySpaPlan

    • 4719 Words
    • 97 Pages

    confidential in nature, other than information which is in the public domain through other means and…

    • 4719 Words
    • 97 Pages
    Powerful Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Protection- All information should be protected by staff and professions to protect the clients. Also all private and confidential information you share with your employer is protected so they do not share it without your permission.…

    • 973 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Data protection: employees must know their personal data cannot be divulged to a third party and it has to be relevant and not exaggerated.…

    • 2459 Words
    • 9 Pages
    Good Essays
  • Good Essays

    What is the AIC triad? The AIC triad is refers to availability, integrity, and confidentiality. Availability is the access to the information needed. Access no matter where or when the person tries to access the information he wants. Availability is seen in popular websites like youtube, yahoo, and google, where we can access the information wherever and whenever we want it. Integrity means that the information is shown is accurate. Not only accurate but also that the information is not tampered with. Meaning the information someone sees will not be altered unless intentionally altered by the creator. Integrity can be seen when information on these websites are not changed. Lastly, confidentiality is the limited access to certain information. Meaning confidentiality gives access to only authorized users and not access to unauthorized users. Out of all 3, availability is most important.…

    • 482 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    It is very important to keep information secure and private that individuals and staffs private information will stay protected from unauthorised viewing. It is their right to to have their private information to be protected. It is important to protect information to avoid indentity theft. As well as to keep service users trust between services and service users. To gain their trust, they have to know that their private information is safe and protected and can`t be used against them or seen by someone who has no permission to see it. Without all these things services can`t have confidentiality and trust from service users and their services wouldn`t have any users as people wouldn`t be able to feel safe and protected and would leave them feeling vulnarable as their information could be accessed by anyone.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4222-201 Essay

    • 1063 Words
    • 5 Pages

    Confidentiality means keeping personal information safe, so that electronic and written information cannot be accessed by anyone that doesn’t need to see it. Also not sharing someone's information without their prior consent. This is covered by the Data Protection Act 1998.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Confidentiality means not sharing information about individuals without their knowledge and agreement and ensuring that written and electronic information cannot be accessed or read by people who have no reason to see it.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality is closely interwoven with the concept of privacy. Every individual has the right to privacy. Privacy requires that facts or information which have been shared by someone with another party remain private and are not disclosed without the permission of the person who gave them. Keeping information private and safe, passing on private information with the individual’s permission, only passing on information to others who have a right to it and need to know it.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Miss

    • 493 Words
    • 2 Pages

    You need to be open and honest when keeping data protection confidential as you need to be careful where you are sharing information as it might turn into conflicts and dilemmas but where you are sharing the information the person might get angry with you as you may cause conflicts and may put yourself in a dilemma if you have done the right thing to share the information.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The CIA refers to the triad of three concepts included in the information sharing and communication within and outside the organizations. this CIA is the short term for the Confidentiality, integrity and Availability. these three concept are also the three properties of the CIA. the confidentiality is actually related with the fact that any piece of information that is an importance resource of the organization like one of its trade secret or any of the reason behind its competitive advantage should not be leaked out of the company in an unethical or corruptive manner. the information must be tried to keep safe with high responsibility and importance must be given to protection of confidentiality. the integrity refers to the moral values in…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    CONFIDENTIALITY: Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data transferred from one computer to another.…

    • 813 Words
    • 4 Pages
    Good Essays