Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Cover Page

Discussion

Computer security is becoming very important as the world is seen to be moving at a

faster rate and so security helps them in the back to move faster. Security which can also be

said as protection helps the computer to access the affordable information system which

applies to any kind of objectives and which also satisfies the integrity, availability, and

confidentiality of the systems of the computer (Trahair et al., 2020). While protecting the

employee’s personal identifiable information the triad can help to ensure this in the following

manner. As the CIA triad is a triangular shape object which consists of confidentiality,

integrity, and availability and the main focus of the triad is to protect the data and the services

of the employees.

First, the confidentiality component itself says that it is related to the privacy of the

data that an organization has regarding its employees. This measure usually helps to design

and prevent the attempts of unauthorized access from an unknown person into the data of a

very confidential organization (Copková, 2021). Therefore, it can be said that through the

help of the confidentiality component of the triad, the data cannot fall into the hands of the

wrong persons.

Second is the integrity component of the triad through which maintaining the

consistency and the trust of the employee’s data is of prime importance. It is to be taken good

care that the data must not change or it must not be altered by any unauthorized people. For

example, the alteration might take place as a breach in the confidentiality component of the

triad.

And the last component of the triad is the availability component states that the

information that has been put down in the triad and which was secured can be easily and

consistently accessed by authorized parties (Day et al., 2019). The data of the employee’s
personal identifiable information (PII) can only be accessed by the employee and not by any

other people in the organization.


Reference

Copková, R. (2021). Burnout Syndrome and Dark Triad at Schools: Engineers as Teachers of

Vocational Technical Subjects. Journal on Efficiency and Responsibility in Education

and Science, 14(3), 195-203. [Accessed by

https://files.eric.ed.gov/fulltext/EJ1317996.pdf ]

Day, A., Barber, L., & Tonet, J. (2019). Information communication technology and

employee well-being: Understanding the “iParadox Triad” at work. The Cambridge

handbook of technology and employee behavior, 580-607. [Accessed by

https://www.researchgate.net/profile/Larissa-Barber/publication/331256162_Informat

ion_Communication_Technology_and_Employee_Well-

Being_Understanding_the_iParadox_Triad_at_Work/links/

5d01b42d4585157d15a6a8b3/Information-Communication-Technology-and-

Employee-Well-Being-Understanding-the-iParadox-Triad-at-Work.pdf ]

Trahair, C., Baran, L., Flakus, M., Kowalski, C. M., & Rogoza, R. (2020). The structure of

the Dark Triad traits: A network analysis. Personality and individual differences, 167,

110265. [Accessed by

https://www.radoslawrogoza.com/uploads/1/2/3/1/123141801/trahair_et_al._2020.pdf

You might also like