preview

Information Security Components Paper

Decent Essays

Initially we should start with identifying and defining the four security components to ensure we have a clear understanding of what they are and how to implement them. The components of information security are Confidentiality, Integrity, and availability also known as the CIA triad. Confidentiality in Information Security is defined as the protection of information from disclosure to unauthorized parties (Chia, 2012). Integrity in Information Security is defined as protecting data from being modified by those not authorized to do so. Authentication is defined as proof that the individual requesting access is who they say they are. Non-repudiation is an assurance that someone cannot deny something, in information security this might be completed …show more content…

The stated purpose of the assignment is to achieve security while sending data from one point to another, over any communications medium. This would include telephones (hardline), which is beyond most civilian agencies currently, unless is a VOIP telephone or something similar. I have used the technology for this before, but it was while I was in the military and the device is not cheap. For sending information over any computer or digital communications device, the initial step would be for the sender to generate their message. After generating the message, the sender should assign a hash value to it, this is a code of the message. The sender would want to protect his hash to prevent it being stolen or altered, therefore the sender would use a hashing algorithm to encrypt the message using their private key. The hash would then be attached to a message or whatever medium is being used to communicate. The sender would use their digital signature to sign the message, which would fulfill the non-repudiation requirement. The message would then be encrypted using the public key of the recipient. At this point the message is ready to be sent to the

Get Access