Cyber Threats and CIA Triad Overview
Cyber Threats and CIA Triad Overview
A computer in the wrong hands is considered the most dangerous weapon because individuals dedicated to stealing and exploiting data can cause significant harm, impacting lives worldwide. Cyber criminals can swiftly spread cyberattacks, creating widespread disruption and damage without needing physical presence .
Key vulnerabilities include the widespread reliance on computer systems across essential sectors, lack of public awareness about cybersecurity, and outdated security measures. These factors allow cybercriminals to exploit information systems effectively, as evidenced by multiple real-world incidents like phishing and data breaches .
Cyberattacks are ranked above physical threats in terms of perceived danger to national security in over twenty countries, indicating society's reliance on computer systems and networks. Disruptions to these systems can have devastating impacts on essential services like power, water, transportation, and finance .
System unavailability can critically impede access to necessary resources, affecting both client and employee access to accounts and services. This can halt business operations, lead to financial loss, and damage an organization's reputation, as customers and employees cannot perform necessary tasks .
Cyber-criminals can engage in cyberstalking, phishing, identity theft, unauthorized computer access, and using keyloggers. Phishing, for example, can lead to financial loss or identity theft, as individuals may inadvertently provide sensitive information to fraudulent websites .
Data confidentiality involves ensuring that sensitive information is not disclosed to unauthorized individuals. It is significant because it protects personal and organizational secrets, preventing unauthorized access that could lead to misuse or exploitation of information .
Network attacks often occur during employee break times or periods of high activity when cybercriminals assume that defenses may be less vigilant or distracted. By targeting these times, attackers increase the likelihood of executing their attacks undetected, taking advantage of potential lapses in monitoring .
Cyber threats are prioritized above physical threats because they target critical infrastructure that supports societal functions like power grids, financial systems, and communication networks. Disrupting these systems can lead to widespread chaos with potentially few immediate physical barriers to entry or detection. Examples include high-profile data breaches and attacks on essential service sectors, demonstrating their capability to cause substantial harm and the global shift in threat perception .
Data integrity is maintained by ensuring data accuracy, consistency, and trustworthiness. This includes identifying and correcting errors or unauthorized alterations. Failure to maintain data integrity can result in the use of falsified or corrupted data, leading to incorrect decision-making and loss of credibility .
The US Office of Personnel Management data breach exposed sensitive information of 19.7 million individuals and an additional 1.8 million people who underwent government background checks. This significant breach underscores the critical need for robust cybersecurity measures to protect sensitive data from such large-scale intrusions .