Confidentiality, Integrity, Availability
the pillar of cybersecurity that consists of three essential elements crucial to the operation of
a business...
Confidentiality: It ensures that sensitive information is kept private and accessible
only to authorized individuals or systems. This involves controlling access to prevent unauthorized
disclosure, whether accidental or intentional. Effective confidentiality measures ensure that necessary
personnel have the right access, while others are restricted.
Breaches of confidentiality can occur through direct attacks like man-in-the-middle (MITM) attacks,
network spying, or privilege escalation. Additionally, human error, such as sharing passwords or failing
to encrypt data, can lead to unintentional violations. To protect confidentiality, organizations can
implement access control policies, encryption (e.g., AES, DES), VPNs, multi-factor authentication (MFA),
and user training (MOST IMPORTANT). These measures reduce the risk of unauthorized access and ensure that
sensitive data remains secure.
Integrity: ensures that data remains accurate, authentic, and free from unauthorized
modifications. Reliable data builds trust, while tampering or corruption can harm an organization's reputation
and operations. For example, altering executive details on a company website can damage credibility. Data
integrity can be compromised intentionally through hacking, bypassing security systems, or altering logs, or
unintentionally through human error or inadequate security measures.
To safeguard data integrity, organizations use hashing (e.g., SHA, MD5), encryption, digital signatures, and
certificates from trusted authorities. Non-repudiation techniques, such as digital signatures, ensure that the
origin and receipt of data cannot be denied. Comparing hash values before and after data transfer also verifies
that the data has not been altered during transmission.
Availability: ensures that systems, networks, and data are accessible when needed by
authorized users. Reliable access is essential for both internal operations and customer services. Delays or
disruptions can hinder productivity and impact business continuity.
Threats to availability include power outages, natural disasters, and cyberattacks like denial-of-service (DoS)
and ransomware. A lack of disaster recovery plans or fail over systems can prolong downtime.
To maintain availability, organizations implement redundant systems, regular maintenance, software updates, and
network monitoring. Disaster recovery plans and data backups further enhance resilience, ensuring operations can
resume quickly after disruptions. Proactive measures prevent bottlenecks and minimize the risk of unavailability.