Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Integrity ensures that only authorized individuals have access to data

08/12/2021 Client: muhammad11 Deadline: 2 Day

POST – 1 please provide one reply to this post.

1.Do you think nonrepudiation falls under one of the tenets of the C-I-A triad (confidentiality, integrity, and availability)? Why or why not?

A security model of any organization involves three main attributes called C-I-A triad which stands for confidentiality, integrity and availability. These three tenets of information security guides information security policies of an organization. One or more of these principals are violated when any kind of cyber-attack, data leak or data breach happens in an organization. Confidentiality assures that only authorized personnel or party can access an organization’s sensitive information or database thus keeping unauthorized access at bay. Integrity ensures that data do not get corrupted or tampered with and remains accurate, consistent and authentic over its lifecycle. Similarly, availability ensures that the data is available and ready whenever it is required. This is ensured by keeping all hardware working, minimizing downtime in case of unavoidable events by keeping backups and redundant devices, maintaining network etc. Now let’s come to nonrepudiation, Non-repudiation refers to a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract. The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated" (Zhou, 2001). So, I think nonrepudiation falls under integrity category of C-I-A triad because non repudiation confirms that a message was send by its original sender and that its origin cannot be questioned with. This means that the message reaches the receiver untampered and in its authentic form which is what integrity also ensures.

2. Is the C-I-A triad adequate when selecting controls for a Windows system? Why or why not?

In my opinion C-I-A triad although speaks a lot about information protection is not adequate when selecting controls for a Windows system. This is because C-I-A triad is entirely concerned with information only and do not talk anything about accountability and responsibility. Another thing is C-I-A model do not relate anything about the interdependence between its triads. For example, increasing confidentiality and integrity may result in compromise of availability (Solomon, 2021). This means a less available system can have more confidentiality and integrity than easily available system. Although availability ensures that we get easy access to the resource when needed but this does not mean that an unauthorized use of hardware is not possible. Also, the C-I-A triad do not talk anything about authentication which involves establishing the identity of a user.

References

Solomon, M. G. (2021). Security Strategies in Windows Platforms and Applications (3rd ed.). Burlington, MA: Jones & Bartlett Learning.

Zhou, J. (2001). Non-repudiation in Electronic Commerce

POST – 2 please provide one reply to this post.

Nonrepudiation falls under one of the C-I-A triad’s tenets.Non-repudiation refers to the assurance that an individual cannot deny anything. Nonrepudiation typically is the ability of ensuring that a party to a certain communication or contract cannot deny the originality or authenticity of their personal signature on a given document or sharing a message or information that they originated("The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute", 2020).Non-repudiation needs the creation of various artifacts that could be used in disputing the claims of an organization, which denies being the originator of a certain communication or action. Suchartifactscontain a given identity, whose authenticity is the tangible evidence that connects an identified party to a certain action or communication. Digital signatures ensure data integrity by guaranteeing the identity of the sender. Digitalsignatures enforce the identity of a sender to ensure that the sender cannot deny the act later. Timestamps possess the date and time when the document was developed or composed in generating an evidence of,the availability of the document at that particular time.

C-I-A triad adequate while selecting controls for a given system of Windows. The CIA’s integrity can be verified by the use of a hashing algorithm. A hash of the message is essential generated and attached to the end of communication or message(Spiceworks, 2020). The person receiving the message calculates the message’s hash and compares it with the received hash. In case anything changed during the transit process, the hashes cannot match. The hashes used in storing data are completely different from hashes of cryptographic. Before the release of Windows NT, the operating systems of Microsoft were using the LANMAN protocol for purposes of authentication. This was replaced by the NTLM after Windows NT was released.

References

Spiceworks, I. (2020). The CIA Triad and Its Real-World Application. Retrieved 20 June 2020, from https://community.spiceworks.com/topic/2205579-the-cia-triad-and-its-real-world-application

The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute. (2020). Retrieved 20 June 2020, from http://panmore.com/the-cia-triad-confidentiality-integrity-availability

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Maths Master
Engineering Help
Academic Mentor
Accounting & Finance Specialist
Assignment Hub
Calculation Master
Writer Writer Name Offer Chat
Maths Master

ONLINE

Maths Master

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$36 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$39 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$47 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$23 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$21 Chat With Writer
Calculation Master

ONLINE

Calculation Master

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$28 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Murray bridge bus timetable - ME - Main - Essay - Amphenol aerospace connectors catalog - Piggy quotes lord of the flies chapter 2 - Single index model vs capm - Peter skrzynecki migrant experience - Board query questions comp xm - Lab 1 introduction to science exercise 1 data interpretation - A glass sphere with a radius of 15.0 cm - Alcohol interlock exemption victoria - Yoky matsuoka net worth - Comparaciones en espanol worksheets - Need a Marketing discussing question answered - Where is gerber baby food made - Testout 4.3 3 connect network devices - Moe all nighter wood stove blower - Who moved my cheese book review ppt - Titration of hcl and h3po4 with naoh - Saving my first kiss by lisa velthouse pdf - What happens in a positive test for oxygen gas - Urban decay in sydney geography - Two types of data storage ashford university - Introducing public administration 8th edition chapter summaries - Simulation of rutherford's gold foil experiment lab answers - Rebecca boone daniel boone - Bus625 week 5 assignements and week 6 assignments and final project - Cdu casuarina library opening hours - A series of unfortunate events the bad beginning activities - 324 ne 12th st grand prairie tx - Iphone x marketing mix - Nike network structure - Level 7 hair color - What are the three pressures driving sustainable mis infrastructures? - Dr ting shang ping - Amp flexible super contact - 76 animated looming phantom costco - Police and equality assignment - Vernon ah kee becauseitisbitter - Why is bach's brandenburg concerto no 5 unusual - Each kidney contains over 1 million functional units called - Groundwater sustainability and human development - Dorothy day civil disobedience - Virtual lab natural selection glencoe - 14.2 choosing among linear quadratic and exponential models answers - Article Critique - Discussions(SPORT AND SOCIETY) - Matched cassia and ky - Anatomy and physiology - Defence mental health and wellbeing strategy - Johnson and downing 1979 - Pyxis medstation es system station tutorial assessment for nursing answers - Researching Marketing Questions - Canberra theatre centre jobs - What is a medieval drama called - Domtar case study - Double-bubble mind map - Line of best fit least square method - Inoa carmilane color chart - Invictus movie analysis - Independent strategy of an organization to change its current environment - Storage organs in humans - Gestalt and person centered therapy debate - M 5 ib - Get your homework done for you - International units to ml - Good palliative geriatric practice algorithm - Prince2 project product description example - Essentials of negotiation lewicki pdf free - 01.03h response log and questions - Shampoo shop garden city - Wil's grill case study swot analysis - Pass the hoop leadership game - Computer security student dvwa - Week 8: Capstone Instructions: Excel 365/2019 - Level 3 Working with Sales Data Alternate with VLOOKUP - Difference between mbs and cdo - Lies my teacher told me chapter 11 - A job cost sheet of sandoval company - Understand how the Brain copes from adverse Childhood Experience - Air contained in a rigid insulated tank - New trade theory suggests that nations - Weekly Discussion 4 - Cross exchange rate problems and solutions - Our broken constitution analytical essay - Metal cutting technology sydney - Pass the prize game - Matthew 25 14 29 - Cherry toothpaste pot lid - Adding and subtracting matrices activity - Types of wan protocols - Tata corus urban seam - Traditional problems associated with computer crime ppt - Sherman alexie the facebook sonnet - Why cell phones should not be allowed in school article - Is facebook making us lonely essay - Sister cities of brisbane - 10 question accounting quiz - Cisco business edition 6000 installation guide - Christopher pettiet cause of death - Midlife crisis myth or reality - Oma and opa pronunciation