PREVIOUS QUESTION & ANSWER

Q :

What does CIA stands for? (not Central Intelligence Agency)

Explain each of the CIA triad.

A :

 CIA stands for confidentiality, integrity, and availability. In this case, the CIA stands to safeguard the information or data like confidentiality of information, the integrity of information and availability of the information. Confidentiality, Integrity, Availability: The three components of the CIA Triad

Confidentiality:

Confidentiality in the CIA triad refers to the protection of the information from various sources and keeping the information away from public sources and is available only to specified people or groups. Information in nowadays is very critical and if the information like personal records like SSN, bank accounts and health information of any individual is available without any confidentiality it can cause the individual's data which is available can be suffered by various means like personally and financially. Confidentiality, Integrity, Availability: The three components of the CIA Triad

Integrity:

Integrity in the CIA triad refers to the protection of the data from modification by unauthorized persons. Tampering of information from unauthorized sources can be very costly in the field of the financial sector where the person who sends 100 dollars using online transfer and if the transfer was modified in the way to show it was sent as 10,000 dollars it will be very costly to the person who sent the transfer. In data integrity, cryptography is used to ensure the data is not modified by commonly used mechanisms like hashing the data when the data is sent and the data is received. The data which is sent contains a particular hash value and the person who receives the data is also matches with the hash value which is received. However, the hashing of the data should be done in a secure encryption format like a GPG to sign the data. Confidentiality, Integrity, Availability: The three components of the CIA Triad

Availability:

Availability in the CIA triad refers to the access of the data for the authorized people whenever the information is required by the concerned people. The information which is not available when required to access is not useful. There is a number of ways to deny information access to people by using hacking attacks like DDoS attacks. DDoS attacks are the denial of service attacks where the hackers send attacks to overload the web application servers and cause the server to break and stop being the services available to the public. These kinds of attacks, when attacked to major public service or government organizations in a natural disaster scenario, can lead to a big problem. This can be avoided by having the backup strategy to bring back the services very quickly and also have the protection against the DDoS attacks. Confidentiality, Integrity, Availability: The three components of the CIA Triad


Related Questions & Answer

Get Your Solution Free




Get Your Solution Paid




DEMO