CIA Triad :: Overview
C.I.A, important letters in the world of information security and you will find it in many books and articles when studying for certifications. So what is the CIA triad and how does it fit within information security?
CIA triad is a model designed to guide company policies on information security and are considered the three most important pillars within information security.
The ‘C’ is short for confidentiality and should be used to identify sensitive data viewed only by those with the correct permissions. There are two types of data; data in motion and data at rest.
Data in motion: is data that is traversing through a network or a series of networks to a destination. Imagine the following, a Postman has a letter he has picked up from the depot and it is addressed to you. He puts the letter in his bag along with other letters for your neighbors and proceeds to the area to deliver the letters. Your letter is delivered, unopened and is addressed to you only. The confidentiality has been maintained because only you have opened the letter from the sender. The postman hasn’t broken confidentiality while the letter was on the way to the destination, this is maintaining confidentiality while data is in motion.
Data at rest: is data that is stored on a system either electronically or by some means of physical system. If we take the postman scenario again, when letters are at the depot for sorting, they are more than likely separated into different piles based on destination. The letters are then left in those piles until a postman collects them for delivery, this means the letters are not moving or in transit, this is data at rest.
The ‘I’ is short for integrity and focuses on the trustworthiness of the data. This means any changes to data is made only by authorized individuals/systems. Failure to maintain the integrity of the data means the trustworthiness is jeopardized and might not be trusted.
The ‘A’ is short for availability and looks at how often data is available. Providing we are authorized to access data, we should be able to access the data when required. When we can not access data when it is required, we have failed to maintain availability. In networks we often have things such as redundancy, failover devices and even load balancing in place so that we can maintain availability.
You can find a more descriptive overview in Jake’s CISSP section. Click here.