Importance of CIA in Cyber Security Goals


You can discover useful information regarding the objectives of cyber security in this blog. How crucial information or data security is to our daily lives.  You will also get details regarding the three security objectives' pillars.

Cybersecurity works to protect electronic data and systems from harm or unauthorised access. Cybersecurity includes all aspects of unauthorised data access, usage, disclosure, intercept, and destruction. The prevention of unauthorised access to computer systems, networks, and devices is another aspect of it.

Information security refers to a set of procedures designed to guard against unauthorised access to and change of personal data while it is being stored or transmitted.

Information security, which is intended and mandated, protects personal, sensitive, and private information in print and on digital media from unauthorised users. It can be used to confirm, discard, alter, or interrupt information as well as prevent its misuse.

Protecting transmitted data and ensuring its confidentiality, integrity, and availability are the main objectives of information security.


1.CONFIDENTIALITY


  • The definition of confidentiality is the ability of only the intended recipient and the sender to access the contents of a message. 
  • Examples include sending military application information from one higher authority to another higher authority and traffic analysis as an attack that threatens confidentiality.
  • As a result of the intercept, the sender is losing the message's confidentiality.

Tools for Confidentiality



2.INTEGRITY

  • The integrity principle states that information should only be changed by authorised parties and only through authorised mechanisms. 
  • Integrity ensures that data is received exactly as it was sent by an authorised party.
  •  Modification and masquerading are the two attacks that threaten integrity.
  • System integrity ensures that the system carries out its intended purpose correctly and is free from unauthorised tampering. 
  • Data integrity ensures that information is modified only in authorised ways.

Tools for Integrity


3.AVAILABILITY

  • According to the principle of availability, resources must always be accessible to authorised users when needed. Resources include confidential information, software, and hardware components.
  • It guarantees that the system operates properly and that authorised users may access the service.
  • Information about the bank's customers is available to the manager; information about its students is available to the university.
  • The only assault that poses a danger to the availability principle is referred to as a Denial of Service attack.
Following figures shows the security attack which comes under the security goals.
Threat to confidentiality
1.Snooping
2.Traffic analysis

Threat to integrity
1.Modification
2.Masquerading
3.Replaying
4.Repudiation

Threat to availability
1.Denial of service





Comments

Post a Comment

Popular posts from this blog

Threat, Vulnerability and Risk: How are They Different?

How Does Multi-Factor Authentication (MFA) Work?

Top 4 Software Testing Cybersecurity Mistakes to Avoid