I M. S. (2014, July 4). Principle 2:

I will consider Banking

Examples of Privacy
data elements for Banking Institution

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

banking account organization keeps up a wide range of sorts of protection
information components (personal details) like  name, address, and social security number.

limits access to data, trustworthiness gives confirmation that the data is
legitimate or potentially has not been adjusted by different clients, and
accessibility ensures solid access.

the point when the set of three is utilized to ensure electronically put away
data information encryption could be utilized to give information privacy.
Checksums can be utilized to confirm information to give uprightness. An excess
failover could be utilized to give accessibility. 

regards to specific assets, the following are related to the triad:

– Secure Socket Layer (SSL)

– A Common Access Card with pin

– Redundant Array of Independent Disks (RAID)

Open Key Infrastructure is a model of
parts, strategies, and methodology expected to make, oversee, convey, utilize,
store, and disavow computerized endorsements and oversee open key encryption.
Like CIA, its center administrations are confirmation, trustworthiness, and
classification (AIC). It shows up the “A” for accessibility has been
supplanted with Authentication, however this isn’t the situation. Indeed AIC is
a piece of the IAS octave which is an expansion of CIA. It incorporates Confidentiality,
integrity, availability, privacy, authenticity & trustworthiness,
non-revocation, responsibility and auditability. Both consolidate one of the
four measurements of a Reference Model of Information Assurance and Security
(RMIAS), which is an exhaustive diagram of the Information Assurance and
Security space.



Cherdantseva, Y.; Hilton, J.,
“A Reference Model of Information Assurance & Security,”
Availability, Reliability and Security (ARES), 2013 Eighth International
Conference on , pp.546-555, 2-6 Sept. 2013

J., , M. S. (2014, July 4). Principle 2: The Three Security Goals
Are Confidentiality, Integrity, and Availability. Retrieved from


I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out