Skip to main content

Command Palette

Search for a command to run...

Cybersec base#006- CIA Triad and its Measures

Updated
6 min read
Cybersec base#006- CIA Triad and its Measures

Let's take a look at this scenario.

you have a journal/diary where you record your deepest thoughts and feelings. If someone reads it without your consent, you will feel violated and certainly be angry, and will seek measures to secure it(IS THIS CORRECT?). NOW LET US CONNECT THIS TO THE CIA TRIAD

C- Confidentiality- To maintain its privacy, you will put your journal in a locked drawer that only you have the key to.

I-Integrity- To maintain the accuracy of your diary and ensure that no one can delete or alter your writings without your knowledge, you will use a pen that cannot be erased.

A- Availability- You would want your diary to be available to you always, whenever you need to update it. You could make a backup copy of your diary in case your original diary is lost or stolen. This is likely a soft backup copy.

In this post, we will discuss the 3 elements of Cybersecurity, the CIA Triad, along with security measures to ensure each element

Hold on for the ride!!!

From the story above, your journal can be protected so that only you have access to your thoughts and feelings by following the simple steps listed. The same is true for information security; by implementing protections for confidentiality, integrity, and availability, sensitive data and systems can be kept secure and available to ONLY AUTHORISED USERS. Now, let's discuss the CIA in detail.

Confidentiality

Confidentiality is a principle that ensures information is kept private and not exposed to unwanted access, disclosure, or usage

Security Measures to Ensure Confidentiality

Encryption: This is the process of converting plain text into a ciphertext that can only be decrypted with the use of a secret key. Encrypting confidential information ensures that even if an unauthorized person has access to it, they cannot read or use it.

Access Control: Access control techniques only permit those people who are authorized to see confidential information to have access to it. This can be via the usage of password restrictions, two-factor authentication systems, and role-based access control(RBAC).

Physical Security: This is the process of ensuring secure access to locations where sensitive information is stored, such as data centers and servers.

Data loss prevention (DLP): DLP solutions can help to track the movement of private data in an organization and ensure data privacy. it will alert and stop the illegal sharing of sensitive data.

Confidentiality policy: These are procedures that employees must follow to protect confidential information.

Secure Communication: is dependent on secure channels like Virtual Private Networks (VPN) and secure messaging platforms to maintain the confidentiality of private information before it is transmitted on the internet.

Data retention policy: This policy will guide employees on what data to keep, for how long, and how to dispose of data that is no longer necessary. This policy helps in reducing the amount of data held by a company, making it easier to protect and manage.

Training and Awareness: Companies might organize training sessions and awareness sessions regularly for the employees to teach them about the protection of sensitive information. Employees will be evaluated after each training session.

Non-Disclosure Agreements(NDA): employees are required to sign it to ensure that those granted access to the data do not reveal it.

Integrity

Integrity ensures that information is trustworthy in the sense that it’s reliable and authentic.

Security Measures to Ensure Integrity

Hashing: this is the process of converting data into a fixed-length string of characters that cannot be changed back to its original form. Integrity can be ensured by comparing the hash value of received data to the hash value of data as it was sent to ascertain whether the data was altered.

Digital Signatures: are used to control the digital documents' authenticity and trace if they have not been edited. Digital signatures are developed by the use of security processes that allow a signer's identity to be authenticated. The signature is a guarantee from the signer that the information was not changed in any way.

Version Control: It is one of the software engineering disciplines that is necessary for the management of different versions of files kept in history. The system keeps a thorough history of changes, makes vital authorization before such changes are introduced, and prevents unintentional changes. A perfect example is Git

Digital Certificates: These are electronic documents that are used to validate the identification of individuals, companies, or devices and to enable secure Internet communication. They contribute to data integrity by generating digital signatures, verifying identities, encrypting data, and depending on trusted third-party certificate authorities

Data Validation Implementation: data validation methods are also put in place so that data is not incomplete or inaccurate, and it has allowed character. E.g., checking data format, length of fields, and checking the range of values is a part of it.

Change management: This is essential to guarantee that changes to data and systems are permitted, recorded, and tested.

Availability

The principle that ensures data and system accessibility to authorized users at all times is called availability or uptime.

Security Measures to Ensure Availability

Redundancy: the need to duplicate the important systems/components to guarantee availability in case there is a failure.

Business Continuity and Disaster Recovery Planning: Business continuity planning is the ability to continue delivering products or services at predefined acceptable levels following a disruptive incident. Disaster recovery is a set of policies and procedures, along with tools, that recover either the key infrastructure of technology or its systems in the aftermath of a disaster.

Backups: These are copies of important data or system configurations that, if, for any reason, failure or loss occurs, the original data or configurations can be recovered.

Virtualization: This is the technology that makes it possible to run a lot of virtual machines (VMs) in one device. Virtualization effectively manages availability by ensuring the availability of the core applications and services and quickly returning the VM in case of failure, in addition to offering flexible and resilient network virtualization that can be redesigned quickly in the event of a disruption.

Monitoring and Maintenance: This measure helps to identify a potential problem before it grows into a problem that causes a major system downtime. Performance measurements, such as CPU consumption, memory usage, and disk space utilization, may be employed as an assessment that will help to detect a problem and take corrective action in due time. Regular maintenance in the form of improved software versions, security patches for regular updating, and backup copies can help to negate the onset of failures and increase stability of the system.

"Privacy, accuracy, and accessibility are the cornerstones of information management. We need to ensure that we are protecting people's privacy, while also ensuring that information is accurate and accessible to those who need it."

- Ann Cavoukian

Cybersec Shell

Part 15 of 20

Welcome to Cyber Shell! Explore cybersecurity resources, including courses and certifications, tailored to all experience levels. Stay updated with the latest trends, and explore opportunities to advance your skills and career. Thanks for visiting!

Up next

Cybersec base #005: What is an Information Asset|Definition, Types, Asset Container, Asset Register

Once saw a film telling a story about a small tech startup that created a ground-breaking piece of software and was about to strike a lucrative deal with a large business. The software application's source code, though, was stolen from the company's ...

More from this blog

C

Cyvally

26 posts

Cyvally is a blog offering interesting content on everything cybersecurity, with practical tutorials, best practices, and career guidance for beginners and professionals.