{"id":310,"date":"2024-12-01T06:38:45","date_gmt":"2024-12-01T06:38:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/?p=310"},"modified":"2024-12-01T07:38:38","modified_gmt":"2024-12-01T07:38:38","slug":"three-core-pillars-of-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/01\/three-core-pillars-of-the-cia-triad\/","title":{"rendered":"Three core pillars of the CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left\">The guiding force behind the protection of data relies on the efforts and security policies of<br>various companies is the CIA Triad. \u201cCIA\u201d is the acronym for confidentiality, integrity, and<br>availability. This triad aids IT security professionals in developing security polices, as well as<br>identifying key security issues, and developing suitable solutions to those issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Confidentiality: limiting access to information<\/h2>\n\n\n\n<p>Companies handle various types of data, and the sensitivity of some data is more sensitive than<br>others. Types of data include client data, company data and personal identification information of<br>both customers and employees. In the technology-driven world, data is dubbed the new gold, as<br>cybercriminals aim to encrypt or steal data. Thus, these criminals most commonly use<br>ransomware to encrypt valuable data in exchange for ransom, which is typically in the form of<br>cryptocurrency. Furthermore, the price of the payout to be made by organizations to get<br>information back may vary depending on the sensitivity of the encrypted data (Auger et al., 2021).<br>Typically, these ransomware attacks begin when threat actors send phishing emails to<br>employees of the companies, hoping the employees open some sort of attachment or log into a<br>server. Once this happens, these threat actors can have unauthorized access to information<br>when they shouldn\u2019t have.<\/p>\n\n\n\n<p><br>However, not all data breaches are criminal in nature. For instance, a company employee might<br>have accidentally sent classified information to the wrong employee, when it was meant for<br>someone else who has appropriate authorization to that information. Another example, another<br>example would be a worker leaving their computer unattended without logging out to prevent<br>prying eyes or unauthorized access. Regardless of how these breaches occur, the consequences<br>are always sharing classified information with unauthorized individuals (Auger et al., 2021).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can we maintain the confidentiality of sensitive data?<\/h2>\n\n\n\n<p>Confidentiality can be increased by using various countermeasures, as well as special training in<br>organizations to prevent data breaches and increase confidentiality. The use of strong passwords<br>is highly recommended instead of simple, easy-to-guess passwords. Additionally, special training<br>familiarizes authorized personnel about how to handle sensitive documents, as well as risk<br>factors and how to guard them can increase confidentiality. For more sensitive information, it can<br>be stored only in air-gapped computers, disconnected storage devices or in hard-copy form that<br>is stored in a locked room or filing cabinet. Data encryption can also include 2-factor<br>authentication to securely authenticate users, in addition to biometric verification, security tokens,<br>key fobs or soft tokens (Chai, 2022).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Restricting data access using authentication and authorization<\/h2>\n\n\n\n<p>The first countermeasure to limiting data access is authentication. Authentication is composed of<br>numerous processes that enable computer systems to authenticate users to who they say they<br>are. Passwords, biometrics, security tokens cryptographic keys and other techniques for<br>authentication are used for establishing the identity of users logging into the computer system.<br>Authorization is another technique to counter unauthorized access to data. Processes related to<br>authorization determine who has access and who doesn\u2019t have access to certain data. Although<br>authorized users have access to a computer system or server, they don\u2019t have access to all data.<br>Instead, they are limited to data that they\u2019re authorized to view (access control). For these user<br>accounts, data access mechanisms are implemented in the event user accounts are hacked or<br>have employees that have gone rogue can\u2019t compromise data (Fruhlinger, 2024).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrity: maintaining the correct state of data<\/h2>\n\n\n\n<p>This core pillar of the CIA triad is ensuring that data stays intact and unchanged. The integrity of<br>data is important for data that is stored, as well as data that is in transit. Additionally, alterations to<br>data shouldn\u2019t occur, whether it is unauthorized or unintentional. Furthermore, the maintenance<br>of data integrity begins with access control, which ensures that users authorized to modify data<br>are allowed to do so. However, if access controls are not maintained, employees can access a<br>file and may delete or make changes to the file that results in data loss or complications to the<br>network (Auger et al., 2021).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can we maintain the integrity of data?<\/h2>\n\n\n\n<p>The use of file permissions and access controls for users can maintain the integrity of data.<br>Version control use can prevent erroneous changes or accidental deletion by authorized users.<br>Many companies implemented means to detect changes in data should non-human activities like<br>an electromagnetic pulse or a server crash that impact the integrity of data. Data integrity can be<br>verified by checksums, as well as the use of cryptographic checksums. Another technique for<br>data integrity is the use of data restoration means like backups or redundancies should always<br>be available (Chai, 2022).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Availability: reliable and timely access to information<\/h2>\n\n\n\n<p>This pillar ensures that authorized users have uninterrupted access to readily available<br>information. However, there are threats like cyber-espionage in which the attacker impacts the<br>network by encrypting all available data. Consequently, organizations are either forced to give<br>ransom to the attacker or start over from scratch, which is expensive and time-consuming.<br>Another type of attack that can impact data availability is denial of service (DoS) attacks. This<br>attack involves flooding the organization\u2019s server with too many requests, which ends up<br>overwhelming the server and disrupting valuable service for clients and customers alike. Apart<br>from malicious activities, unintentional activities like natural disasters, bandwidth, or unscheduled<br>software patches can impact the availability of data (Auger et al., 2021).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can we maintain the availability of data?<\/h2>\n\n\n\n<p>Companies can maintain the availability of data by performing hardware maintenance, as well as<br>maintaining the operating system. In addition, the use of redundancy, failover, and RAID can<br>reduce consequences should hardware issues occur. In the event of a fire or natural disaster, the<br>organization\u2019s data should be backed up frequently and stored in a geographically isolated<br>location. Moreover, data backups should be stored in fireproof and waterproof locations. The use<br>of various equipment or software like firewalls and proxy servers can prevent downtime and<br>inaccessible data by things like DoS attacks and network intrusions (Chai, 2022).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The CIA Triad is a valuable tool for information security. It is useful in guiding security decision<br>making, in addition to making security polices, while focusing on the three pillars of the CIA Triad.<br>Confidentiality makes sure that unauthorized people don\u2019t have access to organization data,<br>whereas authorized users do have access. The use of access controls, user authentication, data<br>encryption, and implementing company-wide training can increase awareness of looming<br>cybersecurity threats. Integrity is about making sure that data that is stored or in transit is true,<br>complete, and accurate using version control and access controls for users. Lastly, the availability<br>pillar consists of making sure that data is readily available, and authorized users can access the<br>desired information without interruption. This can be accomplished by maintaining appropriate<br>hardware, as well as performing the necessary upgrades, and servicing the operating system to<br>ensure optimal availability. Furthermore, using backups and redundancies are effective<br>techniques in the event of corrupt data and natural disasters.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Auger, G., Scott, J., Helmus, J., &amp; Nguyen, K. (2021). Cybersecurity career master plan: Proven<br>techniques and effective tips to help you advance in your cybersecurity career. Packt<br>Publishing, Limited.<br>Fruhlinger, J. (2024, July 12). What is the CIA triad? A principled framework for defining<br>infosec policies. CSO Online. https:\/\/www.csoonline.com\/article\/568917\/the-cia-triaddefinition-components-and-examples.html<br>Hashemi-Pour, C., &amp; Chai, W. (2023, December 21). What is the CIA triad?: Definition from<br>TechTarget. TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentialityintegrity-and-availability-CIA<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The guiding force behind the protection of data relies on the efforts and security policies ofvarious companies is the CIA Triad. \u201cCIA\u201d is the acronym for confidentiality, integrity, andavailability. This triad aids IT security professionals in developing security polices, as well asidentifying key security issues, and developing suitable solutions to those issues. Confidentiality: limiting access&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/01\/three-core-pillars-of-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/310"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/users\/29388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/310\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}