preview

Essay about Information and the CIA Triad

Best Essays

CIA Triad? Sounds like a secret organization doesn’t it? It almost feels like people are going to come to a screeching halt in your driveway, jump out and take you away, never to be seen again. Sounds very scary. Good thing for us that is not going to happen. Lets get to the point. Information is defined as raw data, which includes words, numbers, value etc. It includes analytical and Factual information. Security is defined as the prevention of intentional harm. The CIA Triad is structure of policies relating to solving problems dealing with information security. Julius Caesar was the first to create something that could be considered as information security. He invented the Caesar cipher. Unless you were meant to see his messages, it was …show more content…

It is like being in a safe, if you don’t know the code you can’t get in. Sounds like a secret society to me. This information is organized in very strict ways. If you aren’t on the list forget about even getting near. There are ways to breach any part of this “club, through hacking. If the data has shown to anyone then it has undergone a confidentiality loss. If someone has seen something they shouldn’t have, such as if a low level employee was able to gain access to higher-level employees information, or recently the breach at Target, where a good number of customers credit card information was accessed.
“Confidentiality can be easily breached so each employee in an organization or company should be aware of his responsibilities in maintaining confidentiality of the information delegated to him for the exercise of his duties. For instance, if an employee allows someone to take a glimpse of his computer screen while he is, at that moment, displaying confidential information on the computer screen may have already constituted a breach of confidentiality.”
(InfoSec Institute)
One would think because of the advancement of technology we could prevent many of these breaches. Yet as much as technology progresses so does the method of breaking it. In order to figure out what works you have to break the system, find its flaws and be able to fix it in order to prevent more breaches from happening.

Get Access