top of page
Search

Basics Of Cybersecurity:CIA Triad

  • Mohd Mudassir Ansari
  • Jul 19, 2022
  • 3 min read

This post i discuss or explain what is CIA and step by step guide what is mean of CIA so let's start-


What is the CIA Triad?


The CIA Triad is not the Central Intelligence Agency composed of US government employees who provide national security intelligence to congressional leaders in America. The CIA Triad in cyber means Confidentiality, Integrity, and Availability. These are the core pillars of information security (InfoSec) a subset of cybersecurity.


The easiest way of thinking about the CIA Triad is as a security model to help unpack various information technology (IT) security components. This model helps develop security policies to identify problem areas on a network while providing appropriate solutions.



Confidentiality


The best way to think about confidentiality is ensuring that only select users can access specific data. This could include encryption techniques, but there are far more ways to achieve confidentiality on a network.


This may include client data, company proprietary data, and customer or employee personal identification information (PII). Most companies' information systems store information that has some degree of sensitivity.


Data is the new gold and criminals target organization data in the hope of either encrypting or stealing data. Then the organization are forced to pay large ransoms to get it back. A common attack technique is a ransomware attack, where a criminal either encrypts or steals your data then holds it hostage until you pay the ransom using cryptocurrency.


Countermeasures to help reduce the likelihood of a data breach and increase confidentially would include the following:


  • Access control list

  • File and volume encryption

  • Authentication through software to control access

  • Administrative policies

  • Continuing employee training and awareness

  • Physical hardenings such as cameras and access control



Integrity


This pillar ensures that your data stays intact and is not changed or altered. This provides data assurance, completeness, and accuracy. Data integrity is essential for both data at rest (stored data) and at flow (emails). Integrity maintenance starts with access control and ensuring that only authorized users have access to modify data.


Data integrity protection extends beyond malicious attacks. Unintentional alterations can occur if access controls are not maintained and the employee obtains access to a file and deletes or alters files, causing data loss or, network complications.


Hackers are becoming more creative and finding novel ways to lure their victims into their clickbait. The cyberwar between cybercriminals and cybersecurity experts is a cat and mouse game. The number one thing you can do to protect integrity of data is ensure your organization's countermeasures are maintained regularly.




Availability


Availability ensures that the users have timely and uninterrupted access to information, systems and networks. How many times have you been working and suddenly your cloud storage stops working or the document you were working on is gone or corrupt? Availability ensures access to data at any time without any obstacles such as network outages or data breach.


A malicious attack includes cyber-espionage, where the attacker's intent is to impact the network by encrypting all the data. By denying access to the data, organizations are forced to pay the ransom or start over from scratch, which can also cost a lot of money and time. There are unintentional and non-malicious activities that impact availability that include natural disasters, bandwidth, or unscheduled software updates.


An example attack method that adversaries use to disrupt companies' data availability is known as Denial of Service or DoS attacks. This is an unsophisticated attack in which an attacker will flood a server with requests to overwhelm and disrupt the web service or degrade services for clients and employees.



Thanks For Reading.
























 
 
 

Comments


ABOUT FEEDs & GRIDs

Hello,I am a Cybersecurity Researcher and SOC Analyst.I currently passed out Comptia security+,eJpt and PNPT certification.I currently find vulnerability like xss,sql,HTML Injection and open redierect in Qwant private search engine.My YesWeHack rank is 456.

SOCIALS 

  • Instagram
  • Facebook
  • Twitter
  • LinkedIn

SUBSCRIBE 

Subscribe More Cybersecurity article and Cyberscurity News 

Thanks for submitting!

© 2023 by FEEDs & GRIDs. Proudly created with mudassir

bottom of page