Which methods work best when applying the CIA triad

docx

School

Lambton College *

*We aren’t endorsed by this school

Course

1103

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by priyz

Report
Which methods work best when applying the CIA triad? An organization should adhere to a broad set of best practices when putting the CIA triad into practice. The following are some best practices, broken down by the three subjects: Discretion The organization's necessary privacy should guide how data is handled. 2FA should be used for data encryption. Update other file permissions and access control lists. honesty To reduce the possibility of human error, make sure staff members are informed about compliance and regulatory obligations. Utilize software for backup and recovery. Use version control, data logs, checksums, access control, and security control to guarantee integrity. Accessibility Make use of safeguards like RAID, failover, and redundancy. Make sure apps and systems are kept up to date. Make use of server or network monitoring tools.
Make sure that, in the event of data loss, a business continuity (BC) and data recovery plan is in place. What is the CIA triad's background? The CIA triad did not originate from a single person; rather, it developed over time. The concept of confidentiality may have been first put forth in a 1976 U.S. Air Force study. Similarly, David Clark and David Wilson's 1987 paper "A Comparison of Commercial and Military Computer Security Policies" also examined the idea of integrity. The paper acknowledged the necessity of accurate data and accounting records for commercial computing. It is not as simple to locate the original source, but in 1988, a year later, the idea of availability spread more widely.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help