AIC Triad Case
432 Words2 Pages
Most IT companies practice securing their company with the AIC triad model all over the world in order to keep their systems and data safe. This Triad was designed to enforce policies that help secure information within an organization. The AIC Triad consists of integrity which consist of criticality, then availability which is the speed of access, and lastly confidentiality which implies of sensitivity. The AIC Triad that I believe is the most important in securing a company is Confidentiality. In the AIC Triad, confidentiality is similar to privacy but in a very tricky way. Confidentiality was designed to prevent sensitive information from getting out and into the wrong hands but also to make sure that it in fact gets into the right hand.