The CIA Triad

The CIA triad does not involve the government program regarding the Central Intelligence Agency. The Cyber definition for CIA is Confidentiality, Integrity, and Availability. These are the three main requirements for a secure system.
Confidentiality refers to privacy. Measures to ensure confidentiality are designed to prevent sensitive information from getting into the wrong hands, while ensuring that the right people can access the information. Hackers main goal is to access the data without authorization. Hardware and software communicate with one another, the software can access the hardware data if the user is authorized and given permission. The data we aim to protect is only accessible based on the security and permissions given out. It is common for data to be categorized according to the amount and type of damage possible if placed into the wrong hands.

Integrity in the triad means that the data can be trusted. Data is modified by the holder in a predefined and authorized manner. Any unexpected modifications or corruption of data shows that the integrity of the data has been violated. Measures used to ensure integrity include file permissions and access controls.

Availability pertains to the access of data when the correct credentials and permissions are given and received. This is best ensured by continuously maintaining all hardware, performing repairs immediately when needed and maintaining a properly functioning operating system environment. Fast and adaptive disaster recovery methods are crucial for worst case scenarios. Safeguards against data loss or interruptions in connections must include unpredictable events like natural disasters and fire. To combat data loss from such occurrences, a backup copy should be stored in a geographically isolated area.

Authentication refers to the process of verifying the identity of an individual. Authorization refers to the process of giving the user permission to access specific resources. Authentication confirms users are who they say they are via passwords, one-time pins, or biometrics including fingerprints or eye scan. Common authorization methods include RBAC (role-based access control. This method allows for employees within a company to view but not modify personal information such as pay, but managers are given full access and able to add, delete, or edit this information.

Leave a Reply

Your email address will not be published. Required fields are marked *