{"id":5007,"date":"2020-07-24T10:23:01","date_gmt":"2020-07-24T10:23:01","guid":{"rendered":"https:\/\/securityx.ca\/blog\/?p=5007"},"modified":"2020-08-18T12:32:21","modified_gmt":"2020-08-18T12:32:21","slug":"confidentiality-integrity-availability","status":"publish","type":"post","link":"https:\/\/securityx.ca\/blog\/confidentiality-integrity-availability\/","title":{"rendered":"EVERYTHING YOU NEED TO KNOW ABOUT THE CIA TRIAD"},"content":{"rendered":"<h1><strong>CONFIDENTIALITY, INTEGRITY AND AVAILABILITY<\/strong><\/h1>\n<p>The well-known CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security.\u00a0 Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT IS THE\u00a0<\/strong><strong>CONFIDENTIALITY, INTEGRITY AND AVAILABILITY (<\/strong><strong>CIA) TRIAD?<\/strong><\/h2>\n<div id=\"attachment_5167\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5167\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cia_triad-1024x576.png\" alt=\"cia triad\" width=\"750\" height=\"422\" class=\"size-large wp-image-5167\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cia_triad-1024x576.png 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cia_triad-300x169.png 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cia_triad-768x432.png 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/cia_triad.png 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5167\" class=\"wp-caption-text\">CIA TRIAD<\/p><\/div>\n<p>Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access. Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct. Availability means that authorized users have access to the systems and the resources they need.<\/p>\n<p>If you are preparing for the CISSP, Security+, CySA+, or another security certification exam, you will need to have an understanding of the importance of the CIA Triad, the definitions of each of the three elements, and how security controls address the elements to protect information systems.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/do-fingerprints-change\/\" title=\"HOW FREQUENT DO FINGERPRINTS CHANGE?\" rel=\"bookmark\">HOW FREQUENT DO FINGERPRINTS CHANGE?<\/a><\/p>\n<h2><strong>WHAT IS CONFIDENTIALITY?<\/strong><\/h2>\n<div id=\"attachment_5169\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5169\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_confidentiality-1024x576.png\" alt=\"what is confidentiality\" width=\"750\" height=\"422\" class=\"size-large wp-image-5169\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_confidentiality-1024x576.png 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_confidentiality-300x169.png 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_confidentiality-768x432.png 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_confidentiality.png 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5169\" class=\"wp-caption-text\">WHAT IS CONFIDENTIALITY<\/p><\/div>\n<p>Confidentiality measures protect information from unauthorized access and misuse.\u00a0 Most information systems house information that has some degree of sensitivity. It might be proprietary business information that competitors could use to their advantage, or personal information regarding an organization\u2019s employees, customers or clients.<\/p>\n<p>Confidential information often has value and systems are therefore under frequent attack as criminals hunt for vulnerabilities to exploit.\u00a0 Threat vectors include direct attacks such as stealing passwords and capturing network traffic, and more layered attacks such as social engineering and phishing.\u00a0 Not all confidentiality breaches are intentional. A few types of common accidental breaches include emailing sensitive information to the wrong recipient, publishing private data to public web servers, and leaving confidential information displayed on an unattended computer monitor.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/retina-scan-security\/\" title=\"HOW MUCH SECURITY DOES A RETINAL SCAN OFFER?\" rel=\"bookmark\">HOW MUCH SECURITY DOES A RETINAL SCAN OFFER?<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>WHAT ARE THE RISKS THAT CAN AFFECT CONFIDENTIALITY?<\/strong><\/h3>\n<ul>\n<li>Data encryption<\/li>\n<li>Packet sniffing<\/li>\n<li>Password cracking<\/li>\n<li>Dumpster diving<\/li>\n<li>Wiretapping<\/li>\n<li>Keylogging<\/li>\n<li>Phishing<\/li>\n<li>Ways to ensure confidentiality<\/li>\n<li>Usernames and passwords<\/li>\n<li>Two-factor authentication<\/li>\n<li>Biometric verification<\/li>\n<li>Security tokens or key fobs<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>COUNTERMEASURES <\/strong><\/h3>\n<p>There are many countermeasures that organizations put in place to ensure confidentiality.\u00a0 Passwords, access control lists and authentication procedures use software to control access to resources.\u00a0 These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit.\u00a0 Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as physical controls that prevent people from accessing facilities and equipment.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/infomation-security-audit-checklist\/\" title=\"THE BEST INFORMATION SECURITY AUDIT CHECKLIST TO HELP YOU THRIVE\" rel=\"bookmark\">THE BEST INFORMATION SECURITY AUDIT CHECKLIST TO HELP YOU THRIVE<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT IS INTEGRITY?<\/strong><\/h2>\n<div id=\"attachment_5170\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5170\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_integrity-1024x576.png\" alt=\"what is integrity\" width=\"750\" height=\"422\" class=\"size-large wp-image-5170\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_integrity-1024x576.png 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_integrity-300x169.png 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_integrity-768x432.png 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_integrity.png 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5170\" class=\"wp-caption-text\">WHAT IS INTEGRITY<\/p><\/div>\n<p>In the CIA Triad of confidentiality, integrity, and availability, Integrity measures protect information from unauthorized alteration.\u00a0 These measures provide assurance in the accuracy and completeness of data.\u00a0 The need to protect information includes both data that is stored on systems and data that is transmitted between systems such as email.\u00a0 In maintaining integrity, it is not only necessary to control access at the system level, but to further ensure that system users are only able to alter information that they are legitimately authorized to alter.<\/p>\n<p>As with confidentiality protection, the protection of data integrity extends beyond intentional breaches.\u00a0 Effective integrity countermeasures must also protect against unintentional alteration, such as user errors or data loss that is a result of a system malfunction.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>WHAT ARE THE ATTACKS THAT CAN AFFECT INTEGRITY?<\/strong><\/h3>\n<ul>\n<li>Any type of Man-in-the-middle (MITM) attack<\/li>\n<li>Salami attack<\/li>\n<li>Session hijacking<\/li>\n<li>Data diddling attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>COUNTERMEASURES <\/strong><\/h3>\n<p>There are many countermeasures that can be put in place to protect integrity. Access control and rigorous authentication can help prevent authorized users from making unauthorized changes.\u00a0 Hash verifications and digital signatures can help ensure that transactions are authentic and that files have not been modified or corrupted.\u00a0 Equally important to protecting data integrity are administrative controls such as separation of duties and training.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT IS AVAILABILITY?<\/strong><\/h2>\n<div id=\"attachment_5168\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5168\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_availability-1024x576.png\" alt=\"what is availability\" width=\"750\" height=\"422\" class=\"size-large wp-image-5168\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_availability-1024x576.png 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_availability-300x169.png 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_availability-768x432.png 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_is_availability.png 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5168\" class=\"wp-caption-text\">WHAT IS AVAILABILITY<\/p><\/div>\n<p>In order for an information system to be useful it must be available to authorized users.\u00a0 Availability measures protect timely and uninterrupted access to the system. Some of the most fundamental threats to availability are non-malicious in nature and include hardware failures, unscheduled software downtime and network bandwidth issues.\u00a0 Malicious attacks include various forms of sabotage intended to cause harm to an organization by denying users access to the information system.<\/p>\n<p>The availability and responsiveness of a website is a high priority for many business. Disruption of website availability for even a short time can lead to loss of revenue, customer dissatisfaction and reputation damage.\u00a0 The Denial of Service (DoS) attack is a method frequently used by hackers to disrupt web service. In a DoS attack, hackers flood a server with superfluous requests, overwhelming the server and degrading service for legitimate users.\u00a0 Over the years, service providers have developed sophisticated countermeasures for detecting and protecting against DoS attacks, but hackers also continue to gain in sophistication and such attacks remain an ongoing concern.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>WHAT ARE THE RISKS THAT CAN AFFECT AVAILABILITY?<\/strong><\/h3>\n<ul>\n<li>Any Physical attacks on server infrastructure<\/li>\n<li>DoS and DDoS attacks<\/li>\n<li>SYN flood attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>COUNTERMEASURES <\/strong><\/h3>\n<p>Availability countermeasures to protect system availability are as far ranging as the threats to availability. Systems that have a high requirement for continuous uptime should have significant hardware redundancy with backup servers and data storage immediately available.\u00a0 For large, enterprise systems it is common to have redundant systems in separate physical locations. Software tools should be in place to monitor system performance and network traffic.\u00a0 Countermeasures to protect against DoS attacks include firewalls and routers.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/information-risk-management\/\" title=\"WHAT IS INFORMATION RISK MANAGEMENT? UNDERSTAND IT BETTER!\" rel=\"bookmark\">WHAT IS INFORMATION RISK MANAGEMENT? UNDERSTAND IT BETTER!<\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>THE BOTTOM LINE<\/strong><\/h4>\n<p>Understanding the CIA Triad of confidentiality, integrity, and availability is pretty important as it holds a crucial component of your preparation for a variety of security certification programs. For further information or similar blogs, feel free to visit <a href=\"https:\/\/securityx.ca\/\">Securityx<\/a> anytime, anywhere!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CONFIDENTIALITY, INTEGRITY AND AVAILABILITY The well-known CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security.\u00a0 Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5008,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[42],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.0.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Confidentiality Integrity Availability (CIA) - Everything you need to know<\/title>\r\n<meta name=\"description\" content=\"The well-known CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security.\u00a0\" \/>\r\n<meta name=\"robots\" content=\"index, follow\" \/>\r\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/securityx.ca\/blog\/confidentiality-integrity-availability\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Confidentiality Integrity Availability (CIA) - Everything you need to know\" \/>\r\n<meta property=\"og:description\" content=\"The well-known CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security.\u00a0\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/securityx.ca\/blog\/confidentiality-integrity-availability\/\" \/>\r\n<meta property=\"og:site_name\" content=\"SecurityX Blog\" \/>\r\n<meta property=\"article:published_time\" content=\"2020-07-24T10:23:01+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2020-08-18T12:32:21+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/confidentiality_integrity_availability.jpg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5007"}],"collection":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/comments?post=5007"}],"version-history":[{"count":3,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5007\/revisions"}],"predecessor-version":[{"id":5172,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/5007\/revisions\/5172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media\/5008"}],"wp:attachment":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media?parent=5007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/categories?post=5007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/tags?post=5007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}