Home  >  Subjects  >  Computers / IT / Internet  >  current page My Profile

Achieving Confidentiality, Integrity, and Availability"Literature Review" Chapter

Pages: 20 (5544 words)  |  Style: n/a  |  Sources: 25

Custom Writing

Achieving Confidentiality, Integrity and Availability

Achieving Integrity, Confidentiality and Availability

Shared Centralized Data Processing Environment

In a contemporary business environment, shared centralized data procession has become a critical requirement for the modern day data processing. The centralized shared processing environment allows multiple companies to process large quantity of data remotely within a short period. In other word, the centralized data processing system is the strategy where a data processing is performed by a single computer or cluster of coupled computer, and all data processing operations are performed through a central computer system. Klausm et al. (2007) argue that centralized processing operations started in 1950s. Beginning from1960s, many companies has use the centralized computer systems to connect their headquarters, and branch offices computer systems. Between 1980s and 1990s, there was a proliferation of LAN (Local Area Network) and personal computer assisting organizations to share data with their employees within a location. The rapid development of information technology has led to the development of high volume of data that gives business agents the opportunity to process their data real time and having access to a shared repository of information systems.

In essence, business organizations with similar services have taken the advantages of the internet and development of information systems to implement centralized shared data processing. Some of the transaction processing facility systems that have taken the advantages of the centralized shared data processing systems include Hotel Reservation, Credit Verification and Authorization,. Electronic Fund Transfer, Communication Transaction Router and Loan Payment Processing, In essence, the centralized shared data processing system is able to provide a responsive to data processing solutions for many organizations. The complexity of information requirement within a contemporary business environment makes increasing number of organizations to develop a strategy to implement a shared and centralized data processing. Typically, distributing information over the network system requires the interconnection of multiple sites. In the centralized data processing environment, one machine controls access to files and update, and centralized systems responds to the organizational needs with reference to program and data. In a purely centralized data process model, all organizational data reside in a centralized Datacenter. These include Share Files, Domain Authentication Services, Applications, and Email. The benefits of centralized shared data processing are the lower operational costs and capital. Moreover, the centralized shared data processing model provides less administrative overhead and less backup complexity. A centralized model also provides an efficient processing environment. Despite the benefits that organizations can derive from a centralized shared data processing system, a major concern is security. Typically, achieving the CIA (Confidentiality, Integrity and Availability) is becoming a challenging for organizations within a shared centralized data processing environment. Moreover, it is a big challenge to design an information security system that can safeguard organizational data. Dongarra, (2012) points that a centralized shared computer system is a high performing machine with a shared-memory systems having multiple CPU (central processing unit).

Choi, Chun, Kim et al. (2013) argue that forgery is the major security concern of the centralized shared data processing. Since all the data are in a digital form, data can be created, manipulated and modified in many form. Moreover, a sophisticated hacker can easily modify and forge data in transit making the data to face serious threat. Ernst & Young (2014) support this argument by pointing out that a centralized shared data processing approach provides both opportunities and risks. Typically, the centralized shared data processing service can provide more data processing efficiency at lower costs, however, organizations face the risks of losing their data if effective data security is not implemented. Olivier, .(2010) support this argument by pointing out that the implementation of an effective data privacy is one of the major challenges within a shared centralized data processing environment. However, an effective security system can be achieved by balancing the privacy with confidentiality, integrity and availability. In other word, organizations are required to design effective information security to enhance confidentiality, integrity and availability of data.

Reason for Investigating this Case

Several reasons has made the researcher to evaluate the strategy in achieving Confidentiality, Integrity and Availability within a shared centralized data processing environment. First, the research results will enhance the current state of accumulation of knowledge of business managers across the United States and globally. In the contemporary business environment, organizations are increasingly facing security threats making many organizations to lose data worth billions of dollars. The outcome of this research will assist business managers to understand the inherent security risks associated with the design of the centralized shared data processing systems. The research findings will also enhance greater understanding of business organizations the strategy they can employ in enhancing the Confidentiality, Integrity and Availability of their data center.

More importantly, the research will enhance a greater of the governments on the strategy to enhance confidentiality, integrity and availability of their data within a centralized data processing environment. It is essential to realize that increasing number of governments are using the centralized data processing center to share data across several agencies. Thus, the study will enhance a greater understanding of the governments on the strategy they can employ in integrating security system for their centralized data process centers.

Additionally, the research will enhance a greater understanding of the academic community on the strategy business organization and academic community can employ in achieving Confidentiality, Integrity and Availability within a shared centralized data processing environment. In the United States, increasing number of companies are using the centralized data processing center to lower the costs of IT investment. Despite the benefits associated to the centralized data processing computer systems, there are still scanty of literatures that deal with the strategies that organizations can employ in achieving Confidentiality, Integrity and Availability within a shared centralized data processing environment. This study attempts to fill the gap created with lack of literatures on the research topic. The finding of the study will enhance the body of knowledge of individual and the general community about the strategy in achieving Confidentiality, Integrity and Availability within a shared centralized data processing environment.

Confidentiality, Integrity and Availability Triad

Information security refers to the protection of the organization significant information assets. Confidentiality, integrity and availability are the most crucial aspect of the information security. Andress,(2011) argues that CIA (Confidentiality, Integrity and Availability) triad is one of the oldest methods of information security which is used for the IA ( Information Assurance). Typically, the CIA concepts is the fundamental security objectives for the centralized shared data processing systems and the concept is designed to assist organizations to enhance information assurance. It is very critical to understand the loss of CIA triad can have both moderate and high impacts on business organizations . For example, a loss of the CIA can lead to a loss of data, which can have serious impact on organizational operations as well as organizational assets. An adverse effect is a significant degradation of vision and mission that can lead to the damaging of organization assets, and loss of major financial assets.

Stallings, (2011) support this argument by pointing out that the heart of computer security is Confidentiality, Integrity and availability. The confidentiality is the necessary steps taking by an organization to prevent an unlawful release of information assets, and confidentiality is synonymous to privacy. Haughn, & Gibilisco, (2014) defines confidentiality as a set of rule that limits people's access to information. In the contemporary business environment, organizations take a concrete measure to ensure that sensitive information does not get into the hand of wrong people, while the right information gets into the hand of right people. Ballad, Ballad, & Banks, (2010) describe confidentiality as the strategy where information must only be copied by individuals who have the right to copy and access the information. However, a "confidentiality breach occurs when an authorized individual gain access to sensitive information." (Ballad, Ballad, & Banks 2010. p.345). For example, a break of confidentiality occurs when an hardware or laptop containing sensitive information is stolen. Stallings, (2011) include the concept of privacy in the concept confidentiality that refers to "assurance of individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed." (Stallings, 2011 p4).

However, the concept integrity refers to the assurance that information supplied is accurate and trustworthy. Integrity is an information security concept that reveals that information is accessed by only authorized people. However, Andress,(2011) describes integrity as the ability to prevent data from being changed in an undesirable or unauthorized manner. A breach of integrity has occurred when there is an unauthorized change of data or deletion of data. In other word, integrity is the strategy organizations employ to secure an asset as well as ensuring that only authorized parties have the right to modify the information resources. In other words, integrity refers to trustworthiness and accuracy of data. The integrity is to ensure that the data must not be changed in transit and organization are to take necessary steps… [END OF PREVIEW]

Download Full Paper (20 pages; perfectly formatted; Microsoft Word file) Microsoft Word File

Security of Data


Security Policy Dr. Fossett's Dental Office


Security of Health Care Records


Ethics and


Post Tenure Review Validity and Integrity


View 162 other related papers  >>

Cite This Paper:

APA Format

Achieving Confidentiality, Integrity, And Availability.  (2015, January 22).  Retrieved November 21, 2017, from https://www.essaytown.com/subjects/paper/achieving-confidentiality-integrity/8000783

MLA Format

"Achieving Confidentiality, Integrity, And Availability."  22 January 2015.  Web.  21 November 2017. <https://www.essaytown.com/subjects/paper/achieving-confidentiality-integrity/8000783>.

Chicago Format

"Achieving Confidentiality, Integrity, And Availability."  Essaytown.com.  January 22, 2015.  Accessed November 21, 2017.
https://www.essaytown.com/subjects/paper/achieving-confidentiality-integrity/8000783.

Disclaimer