Briefly Define Each of The Three Members of The in
Briefly Define Each of The Three Members of The in
-there are three members of the information security triad. These are the
confidentiality, integrity, and availability. CONFIDENTIALITY is the ability to
restrict access to those who are allowed to see the information we are protecting.
Everyone else is not allowed from learning anything about the contents.
INTEGRITY is the assurance that the information being accessed has not been
altered and truly represents what is intended. AVAILABILITY means that
information can be accessed and modified by anyone authorized to do so in an
appropriate time frame.
-Role based access control is an improved method of access control. Instead of giving
specific users access rights to an information resource, users are assigned to roles and
then those roles are assigned the access. This allows the administrators to manage
users and roles separately, simplifying administration and, by extension, improving
security.
- The purpose of encryption is to encode data upon its transmission or storage so that
only authorized individuals can read it. This encoding is accomplished by a computer
program, which encodes the plain text that needs to be transmitted; then the recipient
receives the cipher text and decodes it (decryption).
-User ID and password and biometrics (fingerprint). The pros of it is that it becomes
much more difficult for someone to misrepresent themselves. One of the cons is it is
time consuming. The time needed to log in to your device and verify on your system
can be inconvenient.
2. What are some of the latest advances in encryption technologies? Conduct
some independent research on encryption using scholarly or practitioner
resources, then write a two- to three-page paper that describes at least two new
advances in encryption technology.
-Some of the latest advances in encryption technologies are Biometrics (fingerprint, facial
and voice recognition) and Homomorphic Encryption.
“Which card reader do I need to use for this account?” “Which aunt’s
birthday is my memorable date for this bank?” Biometric
authentication bypasses a lot of these issues by allowing users to
present themselves, or at least measurable aspects of themselves,
as proof of identity, most commonly their fingerprints, face and voice.
Banks and the companies that provide their voice biometrics make
bold claims for the ability to distinguish individuals’ voices. Hundreds
of speech characteristics are analysed, from accent and speed to
physical characteristics of vocal chords.
Deepfakes aren’t the only thing that might threaten voice recognition
systems as, like the rest of us, they can fall victim to age. Voices
change over time; a 2017 study by voice authentication company
Pindrop found that over two years the failure rate of authentication
more than doubled.
As much as banks are pushing them to, customers may not be quite
ready to say that, figuratively or literally, “my voice is my password”.
The problem with encrypted data is that you must decrypt it in order
to work with it. By doing so, it’s vulnerable to the very things you
were trying to protect it from by encrypting it.
Homomorphic encryption might eventually be the answer for
organizations that need to process information while still protecting
privacy and security. Homomorphic encryption makes it possible to
analyze or manipulate encrypted data without revealing the data to
anyone. Example is when you’re looking for a restaurant when you
are new in one place. When you’re searching, volumes of data with
third parties help you find the best restaurant for you. These also
show what time is it, where you and when you are searching, the
possible types of restaurant, etc. Using the homomorphic encryption,
none of the information would be visible to thrird parties or services
providers. They also won’t be able to see where the restaurant is and
how to get there.
homomorphic encryption has huge potential in areas with sensitive
personal data such as in financial services or healthcare when the
privacy of a person is paramount. In these cases, homomorphic
encryption can protect the sensitive details of the actual data, but
still, be analyzed and processed. it is safe from getting broken by
quantum computers. Just like other forms of encryption,
homomorphic encryption uses a public key to encrypt the data.
Unlike other forms of encryption, it uses an algebraic system to allow
functions to be performed on the data while it’s still encrypted. Then,
only the individual with the matching private key can access the
unencrypted data after the functions and manipulation are complete.
This allows the data to be and remain secure and private even when
someone is using it. Dr. Craig Gentry describes homomorphic
encryption as a glovebox where anybody can get their hands into the
glovebox and manipulate what's inside, but they are prevented from
extracting anything from the glovebox. They can only take the raw
materials and create something inside the box. When they finish, the
person who has the key can remove the materials (processed data).
https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-
homomorphic-encryption-and-why-is-it-so-transformative/?
sh=6ef71be17e93
https://www.raconteur.net/technology/cybersecurity/voice-
biometrics/