{"id":293,"date":"2021-11-29T13:43:39","date_gmt":"2021-11-29T13:43:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/randibullard\/?p=293"},"modified":"2021-11-29T13:43:40","modified_gmt":"2021-11-29T13:43:40","slug":"protecting-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/randibullard\/2021\/11\/29\/protecting-availability\/","title":{"rendered":"Protecting Availability"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>This discussion post will cover ways that a CISO could protect availability and why its protection is important<\/p>\n\n\n\n<p>&nbsp;&nbsp;<strong>What is Availability?<\/strong><\/p>\n\n\n\n<p>Availability is exactly what it sounds like, having the ability to access all available information whenever it is needed. Availability is maintained, only when all information systems are up and running, without fault. Problems with information systems could hinder the access of information, thereby making it unavailable momentarily, or indefinitely. With availability comes security, which means that effective security measures should be in place to reach the desired effect or goal of information availability.<\/p>\n\n\n\n<p><strong>What ways can availability be protected?<\/strong><\/p>\n\n\n\n<p>So how can we protect the availability of our systems? As previously mentioned, it is imperative that all information systems are up and running. This means that all hardware or software should be up to date, at all times, to prevent substantial amounts of downtime. Downtime can also be prevented by implementing firewalls or proxy servers. In the event that systems were to crash or go down, due to natural or unforeseen disasters, it is important to have a disaster or recovery plan.<\/p>\n\n\n\n<p><strong>Why is protecting availability important?<\/strong><\/p>\n\n\n\n<p>In terms of the CIA Triad, without having the ability to access information, confidentiality and integrity would not matter. Most organizations and\/or people rely on applications or networks to function in order to do their job. When availability is compromised, it makes it difficult to navigate around daily work functions and work stations, causing chaos and possible compromise. By having all systems up and functioning properly, it protects the network or system in the sense that there is no amble amounts of downtime.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Availability may not always be protected, but understanding and implementing security measures around safekeeping availability prevents cyber-attacks and leaks of information. Systems should be able to maintain any sensitive information, thus availability should be the main point of focus for any CISO and their company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This discussion post will cover ways that a CISO could protect availability and why its protection is important &nbsp;&nbsp;What is Availability? Availability is exactly what it sounds like, having the ability to access all available information whenever it is needed. Availability is maintained, only when all information systems are up and running, without fault. Problems&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/randibullard\/2021\/11\/29\/protecting-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":17219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/users\/17219"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}