Concept:
The CIA Triad is a foundational model in information security that defines the three primary objectives of protecting information systems and data. It ensures that data is protected from unauthorized access, remains accurate, and is accessible when needed.
Step 1: {\color{red}Confidentiality}
Confidentiality ensures that sensitive information is accessible only to authorized users and protected from unauthorized access. This is achieved through mechanisms such as:
- Encryption
- Access control (passwords, biometrics)
- Data classification
Step 2: {\color{red}Integrity}
Integrity ensures that data remains accurate, consistent, and unaltered during storage or transmission. It protects against unauthorized modification or tampering. Common techniques include:
- Hashing and checksums
- Digital signatures
- Version control and audit logs
Step 3: {\color{red}Availability}
Availability ensures that authorized users have reliable and timely access to data and systems when required. It focuses on maintaining system uptime and resilience using:
- Redundancy and backups
- Disaster recovery plans
- Protection against DoS/DDoS attacks