Introduction to IT Security: The CIA Triad
Introduction to IT Security
Concept of Security
Security entails protecting secret information from unauthorized access.
Examples of secret information include:
Credit card information
Health care information
Passwords for various online accounts
CIA Triad
Overview of the CIA Triad
The CIA triad represents three main goals of IT security:
Confidentiality
Integrity
Availability
Note: CIA is an acronym and not related to the Central Intelligence Agency.
Confidentiality
Definition of Confidentiality
Measures taken to ensure that sensitive information is not disclosed to unauthorized individuals, entities, or processes.
Involves preserving authorized restrictions on access and disclosure to maintain personal privacy and proprietary information security.
Importance of Confidentiality
Essential to keep secret data secure and accessible only to authorized individuals.
Controls used to maintain confidentiality include:
Access Control
Limits access to data based on the security credentials of users (subjects) to the information (objects).
Examples include:
Passwords: Users need correct passwords for system access.
Biometric measures: Fingerprints or facial recognition for authentication.
Access Control Lists (ACL)
Specifies who has permission to access certain files or resources.
Example: A user may receive an "access denied" message if they attempt to access restricted files.
Encryption
Protects data being transmitted (e.g., using SSL or TLS) to ensure only authorized parties can read it.
Important during online transactions (e.g., purchasing products online).
Integrity
Definition of Integrity
Ensures that only authorized individuals can make changes to information, maintaining its reliability and accuracy.
Emphasizes data accuracy and preventing unauthorized modifications.
Importance of Integrity
Essential for maintaining accurate and consistent information within systems.
Mechanisms to Ensure Integrity
Digital Signatures
Used to verify the authenticity of the information and ensure it hasn't been altered or modified.
Example: CEO's digital signature on memos guarantees that data is authentic and unchanged.
Access Control
Limits edit permissions based on user roles, ensuring only specific users can change critical information.
Differentiation between Confidentiality and Integrity
Confidentiality relates to viewing data, while integrity relates to the alteration and manipulation of data.
Availability
Definition of Availability
Ensures that data, systems, and services are accessible to authorized users when needed.
An example of threats to availability includes:
DDoS Attack (Distributed Denial of Service)
A malicious attack that floods traffic to a website, causing it to go offline and hindering business operations.
Importance of Availability
Allows authorized users to access necessary information without downtime.
Strategies to Maintain Availability
Building resilient systems that can continue functioning during failures:
Use of dual power supplies for servers.
Implement RAID systems for hard drives to ensure data redundancy.
Regular backups to restore data in case of system failures.
Summary of the CIA Triad
Confidentiality
Keep secret data secure and accessible only by authorized individuals.
Integrity
Ensure only authorized changes are made to information, maintaining its accuracy and reliability.
Availability
Guarantee that systems are online and accessible when needed, preventing unauthorized downtime.
Conclusion
All IT security measures studied in the course will focus on protecting these three key aspects:
Preventing unauthorized access, manipulation, and maintaining high availability of systems.