Wednesday, May 15, 2024

the CIA Triad

The CIA triad, a foundational concept in IT security, stands for Confidentiality, Integrity, and Availability. It is sometimes referred to as the AIC triad in other contexts.

Confidentiality

  • Ensures that only authorized individuals can access specific data.
  • Protects sensitive information from being disclosed to unauthorized parties.
Common threats include attacks on encryption, social engineering, keyloggers, and vulnerabilities in Internet of Things (IoT) devices

Data protection methods:
  • Data at Rest: Encryption (e.g., AES256 for full disk encryption).
  • Data in Motion: Secure transport protocols (e.g., end-to-end encryption for web transactions).
  • Data in Use: Policies and training (e.g., clean desk policy, strong passwords, multi-factor authentication).
Integrity

  • Ensures that data is not altered or tampered with without detection.
Threats include code injections and attacks on cryptographic systems.

Protection methods:
  • Cryptography
  • Checksums and hashes (e.g., MD5, SHA1, SHA2)
  • Digital signatures

Availability

  • Ensures that authorized users have access to data and systems when needed.
  • Importance varies based on context (e.g., web servers prioritize availability and integrity, while payment systems prioritize confidentiality and integrity).

The balance of these three components depends on the specific needs and context of the business. For example, a web server might prioritize availability and integrity, while a payment system might prioritize confidentiality and integrity. Training, awareness, and strong policies are essential to maintaining the CIA triad's effectiveness.

No comments:

Post a Comment

Recent Posts