Before delving into the CIA concept, let’s quickly refresh our memory. This 49-second video offers a concise overview of the CIA principles in cybersecurity.
In our YouTube video, we focused on cybersecurity fundamentals, exploring three core CIA principles: Confidentiality, Integrity, and Availability (CIA). Let’s recap these key points.
Formal Definition from NIST Glossary
Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information
Integrity: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Availability: Ensuring timely and reliable access to and use of information.
CIA Violation Scenario
Now, let’s explore a scenario that illustrates how breaches in CIA principles can occur in real-life situations.
Compromised Confidentiality:
Imagine “Harry Potter” shares his father’s Netflix account with a classmate, who he has a crush on, so she can watch her favorite shows. In doing so, the confidentiality of the credentials is breached, as unauthorized access to the account is granted.
Compromised Integrity:
When the girl changes the password without Harry’s father’s consent, the integrity of the account is compromised. Integrity ensures that data remains accurate and unchanged. In this case, the unauthorized change to the password violated the integrity of Harry’s father’s account.
Compromised Availability:
Finally, when Netflix suspends Harry’s account for violating their policy on account sharing, the availability of the service is affected. Availability ensures that resources are accessible and operational when needed. Netflix’s decision to suspend the account disrupts Harry’s access to the service, leading to a failure in availability.
#CKCyber #cybersecurity #CIAtriad #digitalsecurity #cybersecurity #Cybersecurity101 #DigitalSecurity #InfoSec #DataProtection #OnlinePrivacy #InternetSecurity #CIAtriad #Confidentiality #Integrity #Availability #CyberAware #CyberEducation #TechSecurity #ITSecurity #OnlineSafety #SecureYourData #ProtectYourself #CyberThreats #CyberAwareness #securityawareness #cyberdefense #InformationSecurity #TechTips #CyberTips #StaySafeOnline #securitytips #CKCyber #cybersecurity #ciatriad
Blog
From Our Blog
Learn about OSI Model
This blog, we will shortly discuss The Open Systems Interconnection Model (OSI...
Navigating the Depths: Exploring the Surface, Deep, and Dark Web
The internet is like a big iceberg floating in the sea. You see only a bit of...
Cybersecurity 101: Phishing, Spear Phishing, and Whaling
Think of the internet as a huge playground where we all hang out. But just...
CK Cyber
To empower you with the knowledge for cybersecurity to protect the cyber-world.