Confidentiality, Integrity, and Availability (CIA triad)

Confidentiality

Ensuring that information is only accessible to authorized users or systems.

  • Goal: Prevent unauthorized access or disclosure of sensitive data.
  • Techniques:
    • Encryption (e.g., AES, RSA)
    • Access control mechanisms (e.g., role-based access control)
    • Multi-factor authentication (MFA)
    • Data classification and handling policies
  • Example: Securing customer credit card information in an online transaction.

Integrity

Ensuring that information remains accurate, consistent, and unaltered unless authorized.

  • Goal: Prevent unauthorized modification, deletion, or tampering of data.
  • Techniques:
    • Hashing algorithms (e.g., SHA-256) to verify data integrity
    • Digital signatures
    • Checksums and parity checks
    • Version control and auditing mechanisms
  • Example: Ensuring that a financial transaction is not altered during transmission.

Availability

Ensuring that authorized users have reliable and timely access to systems and data.

  • Goal: Prevent disruptions or outages that affect usability.
  • Techniques:
    • Redundant systems and backups
    • Distributed Denial of Service (DDoS) protection
    • Regular system maintenance and updates
    • Disaster recovery planning
  • Example: Keeping an e-commerce website operational during a peak shopping period.