Confidentiality, Integrity, and Availability (CIA triad)
Confidentiality
Ensuring that information is only accessible to authorized users or systems.
- Goal: Prevent unauthorized access or disclosure of sensitive data.
- Techniques:
- Encryption (e.g., AES, RSA)
- Access control mechanisms (e.g., role-based access control)
- Multi-factor authentication (MFA)
- Data classification and handling policies
- Example: Securing customer credit card information in an online transaction.
Integrity
Ensuring that information remains accurate, consistent, and unaltered unless authorized.
- Goal: Prevent unauthorized modification, deletion, or tampering of data.
- Techniques:
- Hashing algorithms (e.g., SHA-256) to verify data integrity
- Digital signatures
- Checksums and parity checks
- Version control and auditing mechanisms
- Example: Ensuring that a financial transaction is not altered during transmission.
Availability
Ensuring that authorized users have reliable and timely access to systems and data.
- Goal: Prevent disruptions or outages that affect usability.
- Techniques:
- Redundant systems and backups
- Distributed Denial of Service (DDoS) protection
- Regular system maintenance and updates
- Disaster recovery planning
- Example: Keeping an e-commerce website operational during a peak shopping period.