CIA Triad
CIA Triad
Confidentiality
Definition: Confidentiality refers to the protection of information from
unauthorized access or disclosure. It ensures that sensitive data is only
accessible by those with the necessary permissions.
Techniques:
Encryption: Encrypting data transforms it into a secure format that can only be
read or decrypted by authorized parties with the correct encryption key.
Access Controls: These include password protections, biometrics, and security
tokens that limit access to sensitive data.
Data Masking: In some cases, sensitive data is "masked" or obfuscated, hiding it
from unauthorized users.
Network Segmentation: Limiting access to sensitive data by separating it within
specific network environments that are only accessible to authorized users.
Example: When you send personal information through a secure website (HTTPS),
encryption protects it from being intercepted and viewed by unauthorized parties.
2. Integrity
Definition: Integrity refers to maintaining the accuracy, consistency, and
trustworthiness of data throughout its lifecycle. It ensures that data remains
unaltered unless changes are made by authorized users.
Techniques:
3. Authenticity
Definition: Authenticity ensures that the data, communication, or user is genuine
and has not been impersonated. It verifies that users, messages, and data come from
legitimate sources.
Techniques:
Multi-Factor Authentication (MFA): MFA combines multiple authentication factors
(like a password, a one-time code, or a biometric verification) to verify user
identity.
Digital Certificates: Public key infrastructure (PKI) uses digital certificates to
confirm the identity of parties involved in digital communication.
Cryptographic Signatures: A digital signature verifies the identity of the sender
and ensures the authenticity of a message.
Challenge-Response Authentication: A method where a system challenges the user or
entity to provide information or complete a task that only an authentic party could
successfully perform.
Example: When logging into an online banking system, MFA (like a password and a
code sent to your phone) helps ensure that the person trying to access the account
is authentic.
4. Access Control
Definition: Access control refers to the methods and mechanisms used to regulate
who or what can view or use resources in a computing environment. It ensures that
only authorized entities have access to specific resources, data, or systems.
Discretionary Access Control (DAC): Access is based on the identity of the user and
the owner’s discretion. Users are granted permissions based on the access rights
assigned by the owner.
Mandatory Access Control (MAC): Users cannot modify access control settings, and
access decisions are made based on predefined policies set by the system.
Role-Based Access Control (RBAC): Access is determined by the user’s role within an
organization, where roles are assigned specific permissions.
Attribute-Based Access Control (ABAC): Access decisions are based on a variety of
attributes related to users, environments, and resources.
Example: In a corporate environment, different departments (HR, finance, IT) are
given access only to files and systems necessary for their roles, based on access
control policies.
5. Non-Repudiation
Definition: Non-repudiation ensures that once a party in a communication or
transaction has sent a message or performed an action, they cannot deny having done
so. It provides proof of the origin and integrity of data or communication,
protecting against denial of involvement.
Techniques:
6. Authorization
Definition: Authorization is the process of determining what resources a user or
system is permitted to access after they have been authenticated. It defines what
actions or resources are available based on permissions.
Techniques:
Access Control Lists (ACLs): ACLs specify what operations (read, write, execute) a
user or system can perform on a resource.
Role-Based Access Control (RBAC): Users are authorized based on their role, which
defines the resources and systems they can access.
OAuth and Tokens: OAuth provides a secure method for granting temporary access to
resources, commonly used in web applications.
Policy-Based Authorization: Policies define access rights, specifying what
conditions must be met for a user to gain access to a resource.
Example: After logging into a company's intranet (authentication), an employee is
authorized to access only certain files or systems, depending on their department
or job role.