Skip to main content

How to Learn free Ethical Hacking Tutorial 3 :- CIA Triad of Information Security


Hello Hackers!!!

Hope you guys are learning well. Coming back to the tutorial number 3, today we are going to learn some of the important terms or essentials for securing information or data in simple language. When we talk about securing our data, what exactly does it means? Keeping passwords in smart phones and laptops makes it secure? The answer is big NO! Yeah, it is true. We have to make data secure in such a way that only authorized user can have access to it. Majorly, there are three most important pillars in the field of cyber security to be taken care of. 

They are:
A) Confidentiality, 
B) Integrity & 
C) Availability
People call it as CIA triad. This is a model designed in such a way that guides the security framework policies of any organization.

Let us understand them one by one,

A) Confidentiality:- In the world of computer systems, keeping important information secret from unauthorized users is a tough work. Confidentiality refers to the same. The data or information which is highly confidential should be available to those who are allowed to have access to it. In simple words, we can say that it is a set of rules that bounds the access to the information. This is the first step towards securing data. There are lots of methods used for implementing confidentiality. Some of the methods are, data encryption, use of user IDs and passwords, two factor authentication, bio metric verification, Access Control Lists (ACLs), etc.


B) Integrity:- Integrity can be understood as the originality of information. It refers to the best practice of taking care of the information in order to stop unauthorized access. Information should be kept in such a way that it's integrity should be maintained and not changed without access. There are also different techniques to maintain the integrity. Few of them are, limited access, file permissions, ACLs, checksums or cryptographic checksums, etc. Regular backups should be taken in a proper manner so that in case of breach, recent backup or we can updated files will be available easily.


C) Availability:- Availability, the word itself shows the scope of information and resources available when needed. It invokes that information should be available to authorized person, when it is required. To maintain the third most aspect of the triad, all the resources must be available all the time when needed. To prevent data loss or any disastrous events, regular backups may prove useful. Other security solutions may include safeguard software like firewall, proxy servers, IDS/IPS, DDoS protectors,etc. These equipment can be used against data loss or any undesired attack vectors.


So, this is it for today's lesson. We will continue learning more in upcoming posts. Till the time stay safe and drop your valuable reviews in comment section. Thank you!!!

Popular posts from this blog

Unknown Windows 7 feature: Problems Step Recorder (PSR)

Welcome everyone. You all know that Windows 7 is one of the most finest OS from Microsoft , generally praised by critics, who considers the  operating system  as major improvement over its predecessor due to its increased performance, its more intuitive interface , fewer User Account Control popups,etc & also being a major success for Microsoft; even prior to its official release. ALSO READ:  Windows 10 Free Update to windows 8 users. I’m a bit late in posting this one, but this isn’t still known for many of them..This article is about a hidden (literally) Windows 7 Feature -It’s called the Problems Step Recorder (PSR) intended to  record  the problem that you encounter in your system and save it as a file and then you can share with Microsoft support team or somebody who is helping you to solve the problem. PSR records the steps you’ve taken on the computer automatically including mouse clicks. You can use these recordings to speed up issues when you’re dealing with tech suppo

Best Books