Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Welcome to “Security Threats: Confidentiality, Integrity, and Availability.


After watching this video, you will be able to:
Explain what the CIA Triad is,
list concerns related to the CIA Triad, and
define common regulatory standards and penalties.
A comprehensive security program must include confidentiality, integrity,
and availability.
These are known as the CIA Triad.
Confidentiality means that data is protected from unauthorized access.
Integrity means that data is protected from unauthorized changes.
And, availability means that you have access to your data whenever you need it.
When confidential data is exposed beyond the intended audience, it causes risk.
Confidential information is kept secret to prevent:
identity theft,
compromised accounts and systems,
legal concerns,
damage to reputation,
and other severe consequences.
To determine if data should be confidential, ask:
Who is authorized?
Do confidentiality regulations apply?
Are there conditions for when data can be accessed?
What would the impact of disclosure be?
Is the data valuable?
Cybercriminals are always after sensitive information or personal data.
To keep confidential data secure, control data access,
and use security tools like encryption and multifactor authentication (MFA).
Data is one of the most valuable assets a company can have, but it is not static.
It can be transferred to other systems, altered, and updated multiple times.
Data integrity guarantees that data is accurate, complete, and consistent.
It covers data
in storage,
during processing,
and in transit.
Without data integrity, loss, corruption, or compromise can cause significant
damage
and financial loss for both businesses and customers.
The two main types of data integrity are physical and logical.
Physical data integrity is the collection of actions and fail-safes that protect
the
physical systems that store and process the data.
Logical data integrity are the checks and protocols
that protect data from human error and hackers.
These confirm that data is correct and accurate as it’s
used in different ways within an organization.
Data availability means that authorized users have immediate and reliable access to
their data.
This includes granting access to authorized users with passwords and security
questions.
Some of the most fundamental threats to availability are non-malicious,
including hardware failures, unscheduled software downtime, and network bandwidth
issues.
Malicious attacks against availability include various forms of sabotage
intended to cause harm to an organization by denying users access to the
information system.
One such example would be a DoS (or Denial of Service) attack
where a website or server is targeted with so much traffic that it overwhelms that
system,
degrading performance until the server is unable to respond.
To protect against these threats, systems that require high availability, (99.999%
uptime) have network monitoring, redundant hardware, and backup servers ready to
take over.
If the primary system is compromised, business continuity and customer access can
be maintained.
There are regulatory standards, contracts,
and local laws that companies and organizations must follow to secure and maintain
data.
The Health Insurance Portability and Accountability Act,
or HIPAA, Regulates the use and disclosure of protected health information in
America.
And the General Data Protection Regulation, or GDPR,
regulates digital privacy for all countries in the European Union.
Fines and penalties for non-compliance help companies keep data safe,
secure, accurate, and private.
In this video, you learned that:
The CIA Triad is Confidentiality, Integrity, and Availability,
breaches and data loss can result in financial losses for both consumers and
companies
Regulations like HIPAA and GDPR help to keep data safe, secure, accurate, and
private
Non-compliance or repeated violations of privacy regulations
can result in hefty fines and penalties.

You might also like