The CIA Triad
The CIA triad is a model designed for the purpose of guiding information security policies in organizations. The CIA consists of three components of security, including confidentiality, integrity and availability (Rawat, & Bajracharya, 2015). Confidentiality is considered to be the same as privacy. It includes a set of rules that limit information access. The taken measures in ensuring confidentiality, act in preventing the access of information by the wrong people and ensuring access by the right people. Access to the data in question is restricted to the authorized persons only.
Integrity entails maintenance of data accuracy, consistency and trustworthiness in the data life cycle. This involves various steps taken in ensuring that authorized persons cannot change the data. These steps include multiple measures such as permissions on files and control measures n access to the data. Data can be altered by events such as electromagnetic impulse which are not influenced by humans; hence steps to detect any changes on data are required (Perrin, 2008).
Availability entails an assurance to the authorized personnel of information access which is reliable. Hardware maintenance, hardware repaire and a functioning operating system best ensure availability of information. System upgrades which are deemed necessary are also essential to maintain.
These three components of the CIA triad work together in ensuring information security and mitigating the risks to information in an organization. In an organization. For the CIA triad to be whole, all the three components are essential (Perrin, 2008).