Cybersecurity Fundamentals : The CIA Triad

Updated: Jul 15


What do you think of when you first hear of the word Cybersecurity? Perhaps a hacker in a dark room typing effortlessly on a computer trying to infect or take a hold of people's or businesses systems. This visionary is only a cusp of what is actually done in the field. When it comes to Cybersecurity, it is necessary that we are aware and mindful of the basics of Security to further expand and practice security consciousness in the cyber world no matter the field one is in. You may be a prospective or experience professional in the field, or simply an everyday user of Technology in your company, business or personal life.


This isn't just for tech-savvy people, but also for those who have smartphones, a personal laptop, online bank accounts, etc.. You see, technology is infused in many lives and industries, which shows that security mindfulness will greatly impact the digital safety of you, friends, the company you work for, or your business.


What is Cybersecurity?


Confidentiality, Integrity, and Availability, These are the building blocks of assuring the continuation, protection, and liability of systems and data. This is also known as The CIA Triad. Let's dive into what this is and how you can practice security mindfulness.




Confidentiality



If you’ve watched any law and order the movies have you’ve probably seen documents that reads “CONFIDENTIAL” on them. In any businesses today, the value of securing data is of high importance. Through the advancement of Technology, data is one of the most valuable assets today. It is each company's duty to secure and maintain the confidentiality of information, whether it be their customers Personal Identifiable Information (PII), internal business information that competitors can use to their advantage, confidentiality agreements, data is only accessed from authorized users.



There are a myriad of preventative measures that can be put in place to ensure confidentiality. A few are:  


  • Authentication Procedures such as, Passwords, Two-Factor and Multi factor authentication

  • Access Control lists

  • Encryption

  • Disconnecting WiFi or using a Virtual Private Network (VPN) when logging into your bank account or accessing any other sensitive information when in a public area ( Coffeshops, restaurants, hotel, airport).



Integrity


Making sure the data and systems within a business is protected from unauthorized alteration (delete, add, or change..etc) is necessary to maintain integrity. The accuracy of data is vital to organizations. If information or data needs to be altered, it should only be done so with valid authorization. This is also crucial for e-commerce and business websites when it comes to data integrity. Compromised data can be especially impactful to government systems, like air traffic control systems, as well as healthcare systems that requires a high level of integrity like medical prescription systems, and lastly credit reporting and payroll systems. 


Preventative Measures can include

  • Need-to-know access

  • Keep an audit trail

  • Rotation of duties

  • Separation of duties 



Availability


Availability Is ensuring data is available for it’s users. It is of high importance that users are able to utilize the systems or access data. If there is no availability, this can be a disruption of business continuity. For example, if a retail or restaurant business is not able to take credit cards due to their Point of Sale POS systems being down, customers will have to use cash, and in this day and age, many people do not carry around cash. This can result in customer dissatisfaction, loss of revenue, or even reputation damage if it becomes a recurrent issue.  


To ensure Availability 

  • Data backup

  • Patching

  • Redundancy



We hope this high level view of the CIA Triad well get you more inclined and curious about the involvement of security consciousness in the cyber world. Not only is it great to have or be a user of Technology, but it is also an enhancement to many lives when many can practice these simple tech mindfulness.




122 views
  • LinkedIn
  • Instagram

© 2020 by CYCO LLC. All rights Reserved.