CIA Triad

The main purpose of information security is data protection. The security sector offers a triangle of three principles to protect data from cyberattacks. The CIA triad is the name of this principle.

The CIA is a model designed to guide the policy of Confidentiality, Integrity, Availability Information Security. This is one of the most popular models used by organizations.

  • Confidentiality: The information should be accessible and readable only to authorized personnel. It should not be accessible to unauthorized workers. If someone uses a hacker to access information, the information must be strongly encrypted so that even if the information is obtained, it will not be readable or understandable.
  • Integrity: Make sure that data is not altered by an unauthorized entity. Integrity ensures that information is not corrupted or altered by unauthorized employees. If an authorized person or system tries to change the data and the change fails, the data must be returned and not damaged.
  • Availability: Information must be available to the user when requested. Equipment needs to be maintained, regularly upgraded, and data backed up and restored.

--

--

--

Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Finding and handling GDPR clauses in customer contracts outside the EU

{UPDATE} Panda ABC Running Adventure Spil Gratis Hack Free Resources Generator

Everything you need to know about remote exploitation

remote exploitation

{UPDATE} Ti?n Lên Mi?n Nam TLMN Hack Free Resources Generator

Cardano Daedalus ITN testnet: how to fix not syncing

PAID Network Partners With DIA

What Advantages COVID-19 Gave to Hackers?

Database Security Checklist for Small Teams

Database Security Checklist  for Small Teams

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Al1z4deh:~# echo "Welcome"

Al1z4deh:~# echo "Welcome"

Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

More from Medium

log4shell 0-day Exploit in log4j v2 — What it is?

log4shell 0-day Exploit in log4j v2 - What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)

Revolutionizing Data Security by Design

[EN] TryHackMe 25 Days of Cyber Security: Day 3 Walkthrough

My Experience With Log4j