Cyber Risks in Confidentiality and Integrity

Cybercrime Risks in relation to Confidentiality and Integrity 


Write at least 2500 words analyzing a subject you find in this…related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.



  1. Introduction to confidentiality and integrity.
  2. What are confidentiality and integrity?
  3. What are the cyber risks related to confidentiality and integrity?
  4. What are the steps that can be taken to reduce the cyber risks related to confidentiality and integrity?
  5. Cyber risks related to the confidentiality and integration of communication.
  6. What are some ways to mitigate the cyber risks related to confidentiality, integrity, and data breaches?
  7. Conclusion.


In the last few years, cyber risks in confidentiality and Integrity have increased due to sharing of personal information online. It is due to the growing availability of these digital media and access to them in more and more ways. As cybercrime grows, organizations need to consider their ethical obligations to their customers, employees, and the public. This chapter explores organizations’ moral demands of themselves, their employees, and their customers. There is a high probability for cybercriminals to access personal information and a third party to gain access to it. Several companies have suffered severe damages due to the availability of information stolen by cybercriminals. The privacy of data and information has become a risk for companies and citizens.


What are confidentiality and integrity?

Security of information should be a top priority for all organizations in cyber risk in confidentiality and integrity. It includes organizational data protection and the optimization of information systems. Information security aims to prevent confidentiality, data loss, improper deleting of data, and erroneous data production. The three critical foundations for data security in the CIA triad are privacy, data integrity, and availability. The combination of the three aspects may be used as a basis for developing robust security information policies.
Confidentiality guarantees that unauthorized users do not have access to data transmitted.

Applications, processes, other systems, and people can be the users. When a system is designed,
appropriate monitoring methods should be responsible for determining security and policies to
determine the usage of data by authorized users. All critical data should thus be checked and
monitored at all times. Data should be safeguarded within and outside the car. ‘For this reason,
the focus should be on prevention of passive attacks rather than detection of passive attacks’
(Gunduz & Das, 2018). At the same time, it is being stored (data at stake), during transmission
(data in movement), and during processing to ensure confidentiality in auto processes (data in
use). Data in use may be protected by memory. Cryptography is great in safeguarding the
secrecy of data storage and data in movement, but bear in mind that computational complexity
and reliability increase are required. Thus it should be utilized in time-sensitive operations with

What are the cyber risks related to confidentiality and integrity?

Integrity assures that no unauthorized alteration made to the system and its data.
Integrity security prevents unauthorized persons from altering their data and their operational
systems, apps, and hardware. It is recognized that CRC protects integrity against accidental and
non-malicious mistakes in automotive systems; nevertheless, this technique is not enough for
protection from deliberate data modification. Sensitive information should thus have
cryptographic integrity checksums. In addition, processes should be in place to detect integrity
violations and restore the correctness of any impacted system or data. ‘If the source is authentic
user of the network but message contents has been changed then there is no need to check the
authenticity of the source user’ (Sumra et al., 2015). Data backup and adequate user access,
security controls, and verification of entries are essential to avoid unauthorized alterations and
guarantee information can be recovered when changed.

Several challenges have contributed to non-malicious problems. Different difficulties, such as hardware failures and software outages or a human mistake, or malicious issues like cyber assaults and insider threats, generally connect availability with dependability and system uptime. Users cannot access critical data and apps if the network goes down suddenly. Information security policies and safety measures address issues of accessibility by implementing multiple backups and redundancy to ensure continued operation and business continuity. ‘Making regular off-site backups can limit the damage caused to hard drives by natural disasters or server failure’ (Smart Eye technology, 2020)……….

For further assistance with this assignment and many more please contact us:

Related Articles