Updated several lines to make more concise (#24781)

and refine the definitions of the CIA triad. Updated some of the examples under each one as well.
pull/24789/head^2
yaganub 2018-12-13 22:42:21 -05:00 committed by Manish Giri
parent be63fb4c3c
commit 21bf1120f7
1 changed files with 7 additions and 7 deletions

View File

@ -2,10 +2,10 @@
title: Confidentiality Integrity Availability
---
## Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, and Availability or the CIA triad is the most fundamental concept in cyber security. It serves as guiding principles or goals for information security for organizations and individuals to keep information safe from prying eyes.
Confidentiality, Integrity, and Availability, also known as the CIA triad, are the primary goals of security. All security measures are meant to provide one or more of these goals and all risks are accessed against these goals.
### Confidentiality
Confidentiality is about ensuring access to data is restricted to only the intended audience and not others. As you may expect, the more sensitive the information is, the more stringent the security measures should be. Many privacy laws rely on confidentiality security controls to enforce legal requirements.
Confidentiality ensures access to data is restricted to the intended audience. As you may expect, the more sensitive the information is, the more stringent the security measures should be.
Some measures to keep information confidential are:
- Encryption
@ -15,18 +15,18 @@ Some measures to keep information confidential are:
- Security tokens
### Integrity
Integrity refers to maintaining the accuracy, and completeness of data. In other words, it is about protecting data from being modified by unauthorized parties, accidentally by authorized parties, or by non-human-caused events such as electromagnetic pulse or server crash. For example, a hacker may intercept data and modify it before sending it on to the intended recipient.
Integrity ensures the accuracy and completeness of data and systems. In other words, it is about protecting data, networks and systems from being modified by unauthorized parties, accidentally by authorized parties, or by non-human-caused events such as electromagnetic pulse or server crash. For example, a hacker may intercept data and modify it before sending it on to the intended recipient.
Measures to maintain the integrity of information include:
- Encryption
- Hashing
- Hashing
- Configuration Management
- User Access Controls
- Checksums
- Version Control
- Backups
### Availability
Lastly, information must be available when it is needed. To ensure high data availability, you must maintain a correctly functioning hardware and software and provide adequate bandwidth. But these measures alone are not enough because there are external forces at play; data availability can further be compromised by:
Availability ensures reliable and timely access to data, networks and systems when needed. To ensure high data availability, you must maintain a correctly functioning hardware and software and provide adequate bandwidth. But these measures alone are not enough because there are external forces at play; data availability can further be compromised by:
- Denial of Service (DoS)
- Power outages
- Natural disasters
@ -56,4 +56,4 @@ Other than the CIA triad, there are also other frequently recurring themes in in
- non-repudiation: assurance that someone/ something cannot deny something (e.g. one cannot deny the authenticity of a digital signature)
- authentication: proving that a person is who they claim to be
- reliability: confidence that one can depend on a system or process
- privacy: a generalised counterpart of confidentiality which also address the social consequence of failing to meet the requirement
- privacy: a generalised counterpart of confidentiality which also address the social consequence of failing to meet the requirement