Focus2Learn
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooks
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Link
    • OWASP TOP 10 - 2017
    • Splunk UseCases
    • CCNA Course
    • Switch
    • Port Numbers
    • Windows Event IDs
    • Splunk-Oxygen
    • Privilege Escalation Attack
    • Threat Hunting with Splunk
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controls
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
Powered by GitBook
On this page
  • Overview
  • What Is Confidentiality?
  • What Is Integrity?
  • What Is Availability?
  • Importance of CIA Triad in Cyber Security
  • Glance

Was this helpful?

  1. Information Security

CIA Traid

When talking about network security, the CIA triad is one of the most important model which is designed to guide policies for information security within an organization.

PreviousAAANextCyber Attacks

Last updated 4 years ago

Was this helpful?

Overview

Cybersecurity is aimed at protecting the company’s digital assets against the ever-growing cyber-attacks. Cybersecurity can be ensured by deploying appropriate security controls to provide several security features such as deterrent, prevention, and detection of cybercrimes. The main purpose of cybersecurity is to ensure Confidentiality, Integrity, and Availability (CIA) of data and services.

The lack of security controls place the confidentiality, integrity, and availability of information at risk. These risks also extend to the safety of people and assets within an organization.

CIA is also known as CIA triad.

CIA triad is essential in cybersecurity as it provides vital security features, helps in avoiding compliance issues, ensures business continuity, and prevents reputational damage to the organization. In this article, you will be able to learn how CIA triad helps to enhance your company’s cybersecurity posture.

Confidentiality ensures privacy to the sensitive information while it is in transit over a network. Some proactive measures must be taken to prevent sensitive data from unauthorized disclosure while making it available only to the intended parties. The malicious actors must not intercept the data to use it for nefarious purposes. There are various implementations which can be incorporated to ensure the confidentiality of data.

Eavesdropping (Message Interception) is an example of attacks on confidentiality where access to information is gained in unauthorized manner with the help of packet Sniffers and Wiretappers. Files and programs are copied from the target computer system illicitly.

Integrity refers to preventing data from being tampered with, modified, or altered in an unauthorized way to achieve malicious goals. That means data which is sent must be received intact and unaltered by an authorized party. Integrity is essential for data whether it is in transit or it is in a storage media. Data integrity is crucial for E-commerce and business websites. Various attacks that compromise data integrity include a Man-In-the-Middle (MITM) attack, penetrating into the web server, and introducing malicious code in databases.

Tampering is an example of attacks on integrity where the message flow is stopped, delayed and the message is also modified optionally. The attacker might want to release these messages later on as well. This attack can be carried over via unauthorized assumption of other’s identity. Once such access is gained, the objects are either generated or distributed under this gained identity access.

Use of Hashing Algorithms such as MD5 and SHA1 are normally provided by developers in order to check the integrity of data. Other techniques include certificates, digital signatures, and non-repudiation.

Availability is also a security service which ensures the constant availability of resources and services to only authorized parties in a timely manner. Reliable hardware must be maintained in order to provide constant services to a large number of customers in any organization. There must be less downtime during upgrades and backup of sensitive data in external drives will be helpful in case of data loss.

The organization’s hardware is targeted in such attacks where the hardware is destroyed (by cutting down the fiber) or destroying the software. Software might also be attempted to modify in subtle ways via alias commands as well. Corrupt packets of data might be transmitted from gained access in the transit. These kinds of attacks gain access to lot of confidential information, can abuse the network usage or the computing resources etc.

Attacks such as DoS or DDoS may render a network unavailable as the resources of the network gets exhausted. The impact may be significant to the companies and users who rely on the network as a business tool. Thus, proper measures should be taken to prevent such attacks.

Quick disaster recovery plans should be followed in worst case scenarios. Other important security controls for availability include data backup, patching, and redundant systems. Redundancy ensures fault tolerance. It means, when a primary system fails to perform, the secondary machine is available to continue the delivery of functions and services. In this case, security analysts redirect all traffic or workload to a backup system.

What Is Confidentiality?

is the best solution in this regard. The encryption mainly ensures the confidentiality of sensitive data. It converts the plaintext of data into the ciphertext, which is an unreadable form for humans. Ciphertext can only be understood by the authorized entities. Encryption involves two vital security controls including Symmetric Encryption and Asymmetric Encryption. Use of Strong passwords and Two-way authentication are some of the other methods to ensure confidentiality. In addition, you can also use Steganography to hide data into another type of data such as images, audio, or video files. Hiding sensitive data in large media files is much difficult to compromise.

What Is Integrity?

What Is Availability?

Importance of CIA Triad in Cyber Security

Security breaches and Data thefts are becoming headaches in businesses nowadays. The recent reports and surveys reflect the unpleasant picture of the organization’s cybersecurity posture. The recent data breach scandal of Facebook is on the limelight where the private data of millions of users were compromised. Most companies have unprotected data due to poor policies that could result in data breaches and massive penalties due to compliance issues such as that of . In order to avert this situation, the organizations must deploy the above-said security controls along with various other controls (Such as and ) to enhance their cybersecurity posture.

Glance

✔️
✔️
✔️
✔️
✔️
Cryptography
GDPR – General Data Protection Regulation
SIEM
SOAR
✔️