Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Describe the concepts of confidentiality, integrity, and availability (C-I-A), a

ID: 3876826 • Letter: D

Question

Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typical IT infrastructure. Summarize the threat triad, and explain how security personnel can maintain proficiency in the security field. Your essay should contain a minimum of 300 words. Format your essay using APA style. Use your own words, and include citations and references as needed to avoid plagiarism.

There is another solution here on chegg but it is very disliked by two people, see this link

http://www.chegg.com/homework-help/questions-and-answers/describe-concepts-confidentiality-integrity-availability-c-explain-seven-domains-typical-i-q12557583?trackid=241d99a4&strackid=25ed9704&ii=3

Explanation / Answer

The CIA triad is Confidentiality, Integrity and Availability.

Confidentiality is maintaining the privacy of the data. The data privacy needs to be maintained while transferring and storage. It is prevention of unauthorized disclosure of data. Integrity is ensuring that the data is accurate and no modifications have been done. It’s quite possible while transmitting or storage of data, someone modifies the data, hence the integrity of the data should be maintained. Integrity will ensure that the data is not mishandled and cannot be modified in an unauthorized manner. Availability is making data available to authentic and authorized users whenever required. It should be readily available to all legitimate users.

Seven domains of IT infrastructure involve:

1. User: A user is a person/resource who performs task; he has access to everything or may be restricted access as per needs.

2. Workstation: It is a computer where user performs his task.

3. LAN: Local Area Network - it will have all the computers, network devices such as hubs, switches, routers. The entire device for a particular organization will form a LAN.

4. WAN: Wide Area Network is the communication network, larger than LAN and spreads on a wider area.

5. LAN to WAN: LAN to WAN is the connecting the outside network to internal network. Firewalls are used to restrict the traffic.

6. Remote Access: It is accessing a network from a distant place remotely. Usually this is done by using VPN or remote access services.

7. System/Applications: It involves various applications and software’s used such as databases, operating systems, etc.

For maintaining proficiency in security field, security personnel’s should:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote