Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cia triad authentication and nonrepudiation

25/03/2021 Client: saad24vbs Deadline: 3 days

1.Do you think nonrepudiation falls under one of the tenets of the C-I-A triad (confidentiality, integrity, and availability)? Why or why not?

A security model of any organization involves three main attributes called C-I-A triad which stands for confidentiality, integrity and availability. These three tenets of information security guides information security policies of an organization. One or more of these principals are violated when any kind of cyber-attack, data leak or data breach happens in an organization. Confidentiality assures that only authorized personnel or party can access an organization’s sensitive information or database thus keeping unauthorized access at bay. Integrity ensures that data do not get corrupted or tampered with and remains accurate, consistent and authentic over its lifecycle. Similarly, availability ensures that the data is available and ready whenever it is required. This is ensured by keeping all hardware working, minimizing downtime in case of unavoidable events by keeping backups and redundant devices, maintaining network etc. Now let’s come to nonrepudiation, Non-repudiation refers to a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract. The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated" (Zhou, 2001). So, I think nonrepudiation falls under integrity category of C-I-A triad because non repudiation confirms that a message was send by its original sender and that its origin cannot be questioned with. This means that the message reaches the receiver untampered and in its authentic form which is what integrity also ensures.

2. Is the C-I-A triad adequate when selecting controls for a Windows system? Why or why not?

In my opinion C-I-A triad although speaks a lot about information protection is not adequate when selecting controls for a Windows system. This is because C-I-A triad is entirely concerned with information only and do not talk anything about accountability and responsibility. Another thing is C-I-A model do not relate anything about the interdependence between its triads. For example, increasing confidentiality and integrity may result in compromise of availability (Solomon, 2021). This means a less available system can have more confidentiality and integrity than easily available system. Although availability ensures that we get easy access to the resource when needed but this does not mean that an unauthorized use of hardware is not possible. Also, the C-I-A triad do not talk anything about authentication which involves establishing the identity of a user.

References

Solomon, M. G. (2021). Security Strategies in Windows Platforms and Applications (3rd ed.). Burlington, MA: Jones & Bartlett Learning.

Zhou, J. (2001). Non-repudiation in Electronic Commerce

POST – 2 please provide one reply to this post.

Nonrepudiation falls under one of the C-I-A triad’s tenets.Non-repudiation refers to the assurance that an individual cannot deny anything. Nonrepudiation typically is the ability of ensuring that a party to a certain communication or contract cannot deny the originality or authenticity of their personal signature on a given document or sharing a message or information that they originated("The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute", 2020).Non-repudiation needs the creation of various artifacts that could be used in disputing the claims of an organization, which denies being the originator of a certain communication or action. Suchartifactscontain a given identity, whose authenticity is the tangible evidence that connects an identified party to a certain action or communication. Digital signatures ensure data integrity by guaranteeing the identity of the sender. Digitalsignatures enforce the identity of a sender to ensure that the sender cannot deny the act later. Timestamps possess the date and time when the document was developed or composed in generating an evidence of,the availability of the document at that particular time.

C-I-A triad adequate while selecting controls for a given system of Windows. The CIA’s integrity can be verified by the use of a hashing algorithm. A hash of the message is essential generated and attached to the end of communication or message(Spiceworks, 2020). The person receiving the message calculates the message’s hash and compares it with the received hash. In case anything changed during the transit process, the hashes cannot match. The hashes used in storing data are completely different from hashes of cryptographic. Before the release of Windows NT, the operating systems of Microsoft were using the LANMAN protocol for purposes of authentication. This was replaced by the NTLM after Windows NT was released.

References

Spiceworks, I. (2020). The CIA Triad and Its Real-World Application. Retrieved 20 June 2020, from https://community.spiceworks.com/topic/2205579-the-cia-triad-and-its-real-world-application

The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute. (2020). Retrieved 20 June 2020, from http://panmore.com/the-cia-triad-confidentiality-integrity-availability

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Maths Master
Quick Mentor
Assignment Hub
High Quality Assignments
Top Writing Guru
Peter O.
Writer Writer Name Offer Chat
Maths Master

ONLINE

Maths Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$32 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

Give me a chance, i will do this with my best efforts

$103 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I will cover all the points which you have mentioned in your project details.

$94 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$42 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

I have read and understood all your initial requirements, and I am very professional in this task.

$85 Chat With Writer
Peter O.

ONLINE

Peter O.

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$27 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

America as Superpower--Confrontation in a Nuclear Age (1947-Present) CHOOSE ONE - Rip van winkle essay introduction - Discussion - Week 2 Report - Creo parametric 2.0 academic edition - Is italian salad dressing homogeneous or heterogeneous - Church office administrator job description - Vanguard t rex caravan - Film techniques used in rabbit proof fence - Sumanasinc cellular respiration - Choosing a saint for confirmation quiz - Broadmead rest home basingstoke - Engineering ethics charles b fleddermann pdf - Brunswick inferno blue flame - Umass ulearn - Find the exact value of cot 1 1 - Eley v positive government - Major ions in seawater - Stack using array in java program push and pop - 5.02 english 3 one today - Maccas albion park rail - 03.05 media and politics assessment - Https www csun edu bashforth 098_pdf 06sep15connotation_denotation pdf - The british ministry shrewdly drafted the sugar act of 1764 with the intention of - Informatics in healthcare - Pro products rust out - 普羅 米 修 斯 故事 - Disadvantages of hibernation in animals - What are the objectives of educational planning - Let the carnival begin every pleasure every sin - Global wine war 2009 pdf - English-Discussion: Golden Lines from Linda Seger's "Creating the Myth" - Wifi checking network requirements forever - Week 5 Assignment: Rough Draft of Signature Assignment - Diversifiable vs non diversifiable risk - Treatment goals should be included in the discharge summary - Bose companion 3 series 1 manual - Data structures and algorithms using java william mcallister pdf - The keeper of lost causes book club questions - Body corporate insurance fact sheet - Creating a multimedia presentation student guide - Ads b ground station - InfoTech Import in Strat Plan (ITS-831) - Compare and contrast homer and virgil - What is the probability of rolling 7 with two dice - What exercise should be performed last issa - 129 lb ft to nm - Summary - Medial epicondylitis special test - Cutlip center & broom 2006 - Why did kfc discontinue honey bbq wings - Taylor distributors of indiana fort wayne - Simple electric motor with magnet and battery - Cephalocaudal principle of development - Theories - Which of the following values is not typically used for f$alpha f$ ? - What ice cream flavor am i - Consider laminar flow of a newtonian fluid of viscosity - Information technology - Magnesium nitrite trihydrate molecular mass - Flood maps sunshine coast - Themes in billy elliot - Heineken business strategy - Add force unity 2d - Pointecast presentation - Talib uqdah cause of death - Fep executive search jessica hogan - Research Paper CMRJ306 TOPIC is Driving Under the Influence - Personal statement for data analytics - Why doesn't atticus help carry out maudie's furniture - MBA 640 Conduct a Consumer Buying Behavior Study - English Comp 2 Week 10 - Trigonal planar polar or nonpolar - 67 mcraes avenue penshurst - Analysis Essay 2 - What does me encanta mean in spanish - A pitfall to avoid in pursuing a differentiation strategy is - Joe pips kindly guardian blacksmith - Matterhorn health simulation press release - Convolutional encoder state diagram - Glencoe understanding psychology worksheets - Strategic audit - What are the four strategic alternatives - Meals on wheels jackson county ms - Rhetorical analysis of a music video - Rowan glen smoothy yogurt - King richard the third horrible histories - Delivery models in health care - Bonds a step by step analysis with excel - Discussion Post - How is point of service model financed - Athena diagnostics test results - Blank level questions elklan - Ocr level 2 adult numeracy - Javaris health assessment - Old school publishing inc began printing - Descriptive Statistics - A coffee manufacturer is interested in whether - Psy - Week 3 discussion leadership