Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Consider your organization or   another organization with which you are familiar

Consider your organization or   another organization with which you are familiar

Computer Science

Consider your organization or   another organization with which you are familiar. Briefly describe the   organization and then detail how it uses the CIA Triad model. How does it   meet the three requirements of the model? If not, discuss one way the   organization should address the deficiencies identified.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Cytox Organization

Cytox is a global technology, analytics, and data organization that offers gives access to credit. Cytox as an organization serves as an economic advancement champion, financial literacy steward, and consumer advocate. It aims to increase the availability of capital to businesses and enterprises, which leads to financial independence by individuals. Besides that, Cytox offers financial education tools to college and university students. Cytox powers the world with financial knowledge through its exquisite analytics capabilities that enable consumers to improve their financial decisions.

The CIA Triad Model

The CIA Triad Model encompasses three significant aspects, which are Confidentiality, Integrity, and Availability. With these three aspects, an organization’s information security policies can be guided well. Cytox is one of the global organizations that have embraced the model. This is evident with the model’s first aspect, Confidentiality. First, data encryption has been embraced to complement the first concept. Besides encrypting data, two-factor authentication has been applied in the organization. Cytox requires its users to not only use their password and username to gain access to their accounts but also an additional credential that is specific to the user, which is mainly a PIN (Shave, 2018).

Cytox meets the Integrity aspect of the model by integrating user access controls and file permissions. Cytox has integrated an electromagnetic pulse in identifying data changes that may not have been caused by humans. Nonrepudiation measures enable the organization to have access to login evidence that may be crucial at some point (Nweke, 2017). Cytox’s data availability is top-notch, given authorized parties have readily accessible and consistent information. This is ensured by its fully functioning operating system that has its hardware maintained and upgraded every month. Cytox has employed the Application performance monitoring software that monitors and prevents bottlenecks occurrence.

Related Questions