When talking about cybersecurity, one might wonder “What are we trying to protect ourselves against?”
Well, there are three main aspects we are trying to control, name:
~~) Unauthorised Access
~~) Unauthorised Deletion
~~) Unauthorised Modification
The CIA Triad
The CIA triad is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles.
The CIA triad which stands for Confidentiality, Integrity, and Availability is a design model to guide companies and organizations to form their security policies. It is also known as the AIC triad to avoid confusion with
Central Intelligence Agency(CIA). The components of the triad are considered to be the most important and fundamental components of security. So let me brief you all about the three components
Confidentiality
Confidentiality is the protection of personal information. Confidentiality
means keeping a client’s information between you and the client, and not telling others including co-workers, friends, family, etc.
Integrity
Integrity, in the context of computer systems, refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
Availability
Availability, in the context of a computer system, refers to the ability of a user to access information or resources in a specified location and in the correct format.