Confidentiality, integrity and availability
Confidentiality, integrity and availability
This is the CIA triad of data and services
Confidentiality - Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it
Integrity - Integrity refers to the reliability and completeness of data and includes ensuring information non-repudiation and authenticity
Availability - The concept that authorized users have access to the systems and the resources
The importance of maintaining CIA:
- Maintains Security compilance
- Maintains trust with stakeholders
- Promotes a positive brand image
- Avoids secuirty risks and unauthorised access
- The consequences of not maintaing CIA:
- Financial:
- Regulatory fines
- Refunds/compensation to customers
- Loss of earnings
- Legal:
- Lawsuits
- Termination of contract
- Reputational:
- Loss of clients
- Damage to brand
Identification, Authentication, Authorisation and Accountability
Purpose
- IAAA is used to support the confidentiality, integrity and Availability security concept
- IAAA are a set of primary concepts that aid in understanding computer and network security as well as access control.
Functionality
- Identification and authentication provides a way of identifying a user typically requiring a User-id/Password combo before granting a session
- Authorisation is the process that determines whether the user has the authority to carry out a specific task.
- Accounting keeps track of the activities the user has performed
Application of cyber security:
- To protect property, data and systems from intentional or even unintentional damage
How are Layers of security and Physical elements of security be applied to assure confidentiality. Confidentiality
Layers of security are applied in many ways to assure confidentiality for example, Firewalls are used to stop malicious actors access the network from outside of it. Another way would be to change access levels so only authorised data can be accessed. As well Physical elements of security can be things like making employees sign NDAs, Locking there hardware down.
Access Control Lists (ACL)
An access control list contains rules that grant or deny access to certain digital environments.
- Filesystem ACLs tell operating systems which users can access the system, and what privileges the users are allowed
- Networking ACLs filter access to the network.
How are layers of security and physical elements of security applied to assure confidentiality. Integrity
In an organisation, a manager would have a greater access to data of multiple people than an employee due to the varying tasks that each type of person would need to carry out. The organisation would also have other procedures. Some of the physical restrictions that would be in place would be things like keeping access to the main server room to a minimum, for example, who has access to the key to enter the room. Another example would be keeping the data on an account that only someone like the IT department has access to.
How are layers of security and physical elements of security applied to assure confidentiality. Availability.
Comments
Post a Comment