I data elements for Banking Institution 1. A

I will consider Banking

Examples of Privacy
data elements for Banking Institution

managing an account organization keeps up a wide range of sorts of protection
information components, for example, name, address, and standardized savings

Confidentiality, Integrity, and Availability (CIA) set of three is a model, of
the most significant parts of security, intended to direct approaches for data
security inside an association. Classification limits access to data,
trustworthiness gives confirmation that the data is legitimate or potentially
has not been adjusted by different clients, and accessibility ensures solid

The group of three works in show to
ensure electronically put away data

At the point when the set of three is utilized to ensure
electronically put away data information encryption could be utilized to give
information privacy. Checksums can be utilized to confirm information to give
uprightness. An excess failover could be utilized to give accessibility.

regards to specific assets, the following are related to the triad:

– Secure Socket Layer (SSL)

– A Common Access Card with pin

– Redundant Array of Independent Disks (RAID)

Open Key Infrastructure is a model of
parts, strategies, and methodology expected to make, oversee, convey, utilize,
store, and disavow computerized endorsements and oversee open key encryption.
Like CIA, its center administrations are confirmation, trustworthiness, and
classification (AIC). It shows up the “A” for accessibility has been
supplanted with Authentication, however this isn’t the situation. Indeed AIC is
a piece of the IAS octave which is an expansion of CIA. It incorporates Confidentiality,
integrity, availability, privacy, authenticity & trustworthiness,
non-revocation, responsibility and auditability. Both consolidate one of the
four measurements of a Reference Model of Information Assurance and Security
(RMIAS), which is an exhaustive diagram of the Information Assurance and
Security space.



Cherdantseva, Y.; Hilton, J.,
“A Reference Model of Information Assurance & Security,”
Availability, Reliability and Security (ARES), 2013 Eighth International
Conference on , pp.546-555, 2-6 Sept. 2013

J., , M. S. (2014, July 4). Principle 2: The Three Security Goals
Are Confidentiality, Integrity, and Availability. Retrieved from


I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out