The CIA triad stands for Confidentiality, Integrity, and Availability. My understanding of the CIA is basically the security for all data weather it is how data is stored, who is authorized to the data, and how often is the data available. The CIA triad is a guideline when it comes to keeping data secure. I will be breaking down what each of them mean and my understanding of it.
Confidentiality:
First there is Confidentiality, which is all about keeping information secure to authorized users so data can’t be given out to unauthorized people. Confidentiality can be used in the wrong way if there is stollen data, direct or indirect attacks, unauthorized access to systems, and so on. Of course, mistakes can also happen by human error, things such as not keeping things secure, unsecure passwords, or failure to encrypt data. Overall, to make sure data is given to right people.
Integrity:
Next there is Integrity, this is all about can the data given be trusted. Is the data reliable? Is the data from an authorized user? That also goes back to confidentiality, that’s why all work together to make sure one system is secure. Integrity also makes sure data is stored in a secure place like files or sorts. Integrity can be used incorrectly by simply falling to detect systems. This is how lots of cyberattacks happened today due to small mistakes. Integrity must make sure every mistake an authorized person can make, it can be undone. Therefore, not too much access. Integrity can be better secured by things such as hashing and auditing.
Availability:
Finally, there is Availability, which is making sure data is available when needed. Of course, available for authorized people. Making sure everything is up to date on systems so data can be easily transferred if needed. To make sure availability is always up and running, you must make sure all hardware and software is running correctly.
Conclusion:
The CIA triad to me is the foundation for keeping data secure. By making sure authorized users have information, the authorized user can be trusted with the data, and the authorized user have access to the data when needed.
Citations:
Walkowski, Debbie. “What Is the CIA Triad?” F5 Labs, 8 July 2019, https://www.f5.com/labs/learning-center/what-is-the-cia-triad.
“What Is the CIA triad_ Definition, Explanation, Examples – Techtarget.pdf.” Google Drive, Google, https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view.