{"id":6381,"date":"2020-03-03T10:51:53","date_gmt":"2020-03-03T10:51:53","guid":{"rendered":"https:\/\/cloudkul.com\/blog\/?p=6381"},"modified":"2020-12-30T11:26:53","modified_gmt":"2020-12-30T11:26:53","slug":"what-is-cia","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/what-is-cia\/","title":{"rendered":"CIA &#8211; Pillars of Secure System"},"content":{"rendered":"<p style=\"text-align: justify\">In today&#8217;s world, security is the most worrying factor. Due to lack of security, there is always a risk of losing sensitive information. Therefore, we need to protect our infrastructure to the fullest extent possible, to protect ourselves from cyber attacks of all forms, and to protect our confidential data from unauthorize access and information exfiltration. In addition, there are three key principles that requires to secure information, and these principles are known as CIA Triad. Likewise, these principles are also known as the safety analysis model.<\/p>\n<h2><span style=\"color: #000000\"><strong>CIA Triad<\/strong><\/span><\/h2>\n<p><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2020\/03\/CIA.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6399\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2020\/03\/CIA-300x300.jpeg\" alt=\"\" width=\"613\" height=\"613\"><\/a><\/p>\n<p style=\"text-align: justify\"><strong>CIA<\/strong> Stands for <strong>C<\/strong>onfidentiality, <strong>I<\/strong>ntegrity and<strong>&nbsp;A<\/strong>vailability. It&#8217;s an online balancing information system. The CIA triad is therefore a model that describes the three key objectives requires to achieve information security. And if any of them breaches, then it can have significant repercussions for the involved parties. It is a security model that provides key data protection and serves as a guide for organizations to protect their confidential data from unauthorize access and information exfiltration.<\/p>\n<h2><span style=\"color: #000000\"><strong>Breakout of CIA Model<\/strong><\/span><\/h2>\n<p style=\"text-align: justify\">Confidentiality, integrity and availability, these are the most basic concepts for protection of the information. Such, principles must always be part of the core goals of information security activities in the CIA triad. Therefore, the CIA Triad &nbsp;is an acronym for:<\/p>\n<h2><span style=\"color: #000000\"><strong>CIA : Confidentiality <\/strong><\/span><\/h2>\n<p style=\"text-align: justify\">Confidentiality is the protection against unauthorize access to the information. It simply defines as keeping information secret or hide from unauthorize peoples. Therefore, it ensures that access to the information is grant only to authorize persons.<\/p>\n<p><span style=\"color: #000000\"><strong>Conditions which breaks down Confidentiality<\/strong><\/span><\/p>\n<ul>\n<li><strong>Laptop burglary &#8211;<\/strong> When a laptop has been stolen, destroy or lost due to certain circumstances.<\/li>\n<li style=\"text-align: justify\"><strong>Password theft &#8211;<\/strong> It just means stealing passwords from other network users.<\/li>\n<li><strong>Sensitive emails<\/strong> sent to the unauthorize peoples.<\/li>\n<\/ul>\n<p><span style=\"color: #000000\"><strong>Methods that ensure Confidentiality<\/strong><\/span><\/p>\n<ul>\n<li>Cryptography<\/li>\n<li>ACL (Access Control List).<\/li>\n<li>By using Usernames and passwords.<\/li>\n<\/ul>\n<h2><span style=\"color: #000000\"><strong>CIA : Integrity<\/strong><\/span><\/h2>\n<p style=\"text-align: justify\">Integrity defines the state in which the information is kept correct and consistent until the allowable changes are permit. In brief, it ensures that the data are accurate and complete. Therefore, it simply means maintaining the data or information in its actual state without any alteration. And if changes requires, then only authorize persons should do so.<\/p>\n<p><span style=\"color: #000000\"><strong>Conditions which breaks down Integrity<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify\"><strong>Security Attacks &#8211;<\/strong> security attacks are unauthorize acts to destroy, alter or steal sensitive data against private, corporate or governmental IT properties.<\/li>\n<li style=\"text-align: justify\"><strong>Software Exploits &#8211;<\/strong> It refers to the software or operating system&#8217;s failure, malfunction, or bugs.<\/li>\n<li style=\"text-align: justify\"><strong>Crashing of Server &#8211;<\/strong> If the web server software behind a website crashes, the situation is known as a server crash.<\/li>\n<\/ul>\n<p><span style=\"color: #000000\"><strong>Methods that ensure Integrity<\/strong><\/span><\/p>\n<ul>\n<li>Encryption.<\/li>\n<li>Hashing.<\/li>\n<\/ul>\n<h2><span style=\"color: #000000\"><strong>CIA : Availability<\/strong><\/span><\/h2>\n<p>Availability describes the situation in which information is available when and where it is rightly requires. It simply means the information or data available as and when requires. Basically, it&#8217;s main objective is to provide the information upon access by authorize users.<\/p>\n<p><span style=\"color: #000000\"><strong>Conditions which breaks down Availability<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify\"><strong>DoS (Denial of services) &#8211;<\/strong> It is an attack that attempts to shut down a system or network, which makes it impossible for its intend users to access it.<\/li>\n<li style=\"text-align: justify\"><strong>Breaking of website or server &#8211;<\/strong> If the web server software behind a website crashes, the situation is known as a server crash or breaking of website.<\/li>\n<\/ul>\n<p><span style=\"color: #000000\"><strong>Methods that ensure Availability<\/strong><\/span><\/p>\n<ul>\n<li>Maintenance of hardware.<\/li>\n<li>Prevention against <strong>DoS\/DDoS<\/strong>.<\/li>\n<\/ul>\n<h2><span style=\"color: #000000\"><strong>Non Repudiation<\/strong><\/span><\/h2>\n<p style=\"text-align: justify\">Non-repudiation means the ability to meet contractual obligations. Meanwhile, the sender or receiver cannot decline a transaction. Therefore, it refers to a service that provides evidence of the data sources and the data integrity. It can usually be done through the use of <strong>Digital Signatures<\/strong>. To know more, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Non-repudiation\">visit<\/a>.<\/p>\n<p style=\"text-align: justify\"><strong>Digital Signature<\/strong><\/p>\n<p style=\"text-align: justify\">Digital signatures are often use to fulfill three main information security goals: integrity, authentication, and non-repudiation. It use a standard accepted format to offer the highest security and universal acceptance. Therefore, this is a method that verifies the authenticity and integrity of a file, message, software or digital document by using public and private keys. For further reading, just <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_signature\">click.<\/a><\/p>\n<h2><span style=\"color: #000000\"><strong>Conclusion<\/strong><\/span><\/h2>\n<p style=\"text-align: justify\">In short, the CIA security triangle is an important security principle. As it incorporates all security controls, procedures, and protections. Moreover, the CIA triad has confidentiality, integrity and availability priorities which are fundamental factors in information security. As a result, organizations need to preserve the authenticity of their information. Which means balancing confidentiality, Integrity and availability: the CIA Triad.<\/p>\n<p style=\"text-align: justify\"><strong><em>In case of any help or query, please&nbsp;<a href=\"https:\/\/cloudkul.com\/contact\/\">contact<\/a>&nbsp;us&nbsp;<\/em><em>or raise a&nbsp;<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">ticket<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s world, security is the most worrying factor. Due to lack of security, there <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[87],"tags":[331,329,335,333,334,178,330,332,336,556],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CIA - Pillars of Secure System - Cloudkul<\/title>\n<meta name=\"description\" content=\"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It&#039;s an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIA - Pillars of Secure System - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It&#039;s an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-03T10:51:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-30T11:26:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2020\/03\/CIA-300x300.jpeg\" \/>\n<meta name=\"author\" content=\"Bhawana Dehran\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\",\"name\":\"CIA - Pillars of Secure System - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2020-03-03T10:51:53+00:00\",\"dateModified\":\"2020-12-30T11:26:53+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/1c8f54067c7f81f91da6df1534ce8d62\"},\"description\":\"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It's an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/what-is-cia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/what-is-cia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIA &#8211; Pillars of Secure System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/1c8f54067c7f81f91da6df1534ce8d62\",\"name\":\"Bhawana Dehran\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f035955c6c9130a5f553568a78b245c?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f035955c6c9130a5f553568a78b245c?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Bhawana Dehran\"},\"description\":\"Business Development Executive\",\"url\":\"https:\/\/cloudkul.com\/blog\/author\/bhawanadehran-bd033\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIA - Pillars of Secure System - Cloudkul","description":"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It's an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/what-is-cia\/","og_locale":"en_US","og_type":"article","og_title":"CIA - Pillars of Secure System - Cloudkul","og_description":"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It's an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.","og_url":"https:\/\/cloudkul.com\/blog\/what-is-cia\/","og_site_name":"Cloudkul","article_published_time":"2020-03-03T10:51:53+00:00","article_modified_time":"2020-12-30T11:26:53+00:00","og_image":[{"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2020\/03\/CIA-300x300.jpeg"}],"author":"Bhawana Dehran","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/what-is-cia\/","url":"https:\/\/cloudkul.com\/blog\/what-is-cia\/","name":"CIA - Pillars of Secure System - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2020-03-03T10:51:53+00:00","dateModified":"2020-12-30T11:26:53+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/1c8f54067c7f81f91da6df1534ce8d62"},"description":"CIA Stands for Confidentiality, Integrity and\u00a0Availability. It's an online balancing information design.Thus, the CIA triad is a model that outlines the three main objectives, that are necessary to achieve information security.","breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/what-is-cia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/what-is-cia\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/what-is-cia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CIA &#8211; Pillars of Secure System"}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/1c8f54067c7f81f91da6df1534ce8d62","name":"Bhawana Dehran","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f035955c6c9130a5f553568a78b245c?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f035955c6c9130a5f553568a78b245c?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Bhawana Dehran"},"description":"Business Development Executive","url":"https:\/\/cloudkul.com\/blog\/author\/bhawanadehran-bd033\/"}]}},"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/6381"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=6381"}],"version-history":[{"count":56,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/6381\/revisions"}],"predecessor-version":[{"id":7129,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/6381\/revisions\/7129"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=6381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=6381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=6381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}