Confidentiality, Integrity, and Availability || Cyber Security || GeeksCodes

7 بازدید
بیشتر
Geeks Codes
Geeks Codes
Welcome to “Confidentiality, Integrity, and Availability” After watching this video, you will be able to explain what th ...
Welcome to “Confidentiality, Integrity, and Availability”

After watching this video, you will be able to explain what the CIA Triad is, list concerns related to the CIA Triad, and define common regulatory standards and penalties. A comprehensive security program must contain confidentiality, integrity, and availability. These are known as the CIA Triad. Confidentiality means that data is protected from unauthorized access. Integrity means that data is protected from unauthorized changes. And, availability means that you have access to your data whenever you need it. When confidential data is exposed beyond the intended audience, it causes risk.

Confidential information is kept secret to prevent identity theft, compromised accounts and systems, legal concerns, damage to reputation, and other severe consequences. To determine if data should be confidential, ask: Who is authorized? Do confidentiality regulations apply? Are there conditions for when data can be accessed? What would the impact of disclosure be? Is the data valuable? Cybercriminals are always after sensitive information or personal data. To keep confidential data secure, control data access and use security tools like encryption and multifactor authentication (MFA).

Data is one of the most valuable assets a company can have, but it is not static. It can be transferred to other systems, altered, and updated multiple times. Data integrity guarantees that data is accurate, complete, and consistent. It covers data in storage, during processing, and in transit. Without data integrity, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers. The two main types of data integrity are physical and logical. Physical data integrity is the collection of actions and fail safes that protect the physical systems that store and process the data. Logical data integrity are the checks and protocols that protect data from human error and hackers. These confirm that data is correct and accurate as it’s used in different ways within an organization.

Unauthorized information alteration threatens the integrity of any process or outcome based on that information, including: financial records, vote totals, health records, news stories, and more. Tools that fight unauthorized information alteration include: File integrity monitoring (or FIM), which audits sensitive files and folders to ensure all activity is authorized. And relational database management systems (or RDBMSs). An RDBMS is a database that records user access and data changes. RDBMS is safer than a spreadsheet program. To preserve data integrity, security plans must: Prevent unauthorized user access, Prevent unauthorized data changes by authorized users, And use error checking and data validation. Data availability means that authorized users have immediate and reliable access to their data.

This includes granting access to authorized users with passwords and security questions. Some of the most fundamental threats to availability are non-malicious, including hardware failures, unscheduled software downtime, and network bandwidth issues. Malicious attacks against availability include various forms of sabotage intended to cause harm to an organization by denying users access to the information system. One such example would be a DoS (or Denial of Service) attack where a website or server is targeted with so much traffic that it overwhelms that system, degrading performance until the server is unable to respond. To protect against these threats, systems that require high availability, (99.999% uptime) have network monitoring, redundant hardware, and backup servers ready to take over. If the primary system is compromised, business continuity and customer access can be maintained.

There are regulatory standards, contracts, and local laws that companies and organizations must follow to secure and maintain data. The Health Insurance Portability and Accountability Act, or HIPAA, Regulates the use and disclosure of protected health information in America. And the General Data Protection Regulation, or GDPR, regulates digital privacy for all countries in the European Union. Fines and penalties for non-compliance help companies keep data safe, secure, accurate, and private. In this video, you learned that:

The CIA Triad is Confidentiality, Integrity, and Availability. Breaches and data loss can result in financial losses for both consumers and companies. To preserve data integrity, security plans must prevent unauthorized access and changes. Regulations like HIPAA and GDPR help to keep data safe, secure, accurate, and private. Non-compliance or repeated violations of privacy regulations can result in hefty fines and penalties.

#GeeksCodes #cybersecurity #confidentiality  #Integrity #Availability #management #onlineclass #onlineclasses #onlinecourses #cybersecuritycertification #cybersecurityengineer #securitythreats #emailspam

همه توضیحات ...