Digital Life & Security
Muhammad M.
Sr. SQA Analyst | ISTQB Certified | Certified in Cybersecurity | Certified Blockchain Expert | Certified Blockchain Security Professional
When you pray for rain; you got to deal with the mud too!
Similarly, when it comes to digital lifestyle, while reaping the benefits, you should also be aware of its disadvantages or the typical term is risks.
In the previous article, it was discussed that you need to consider CIA Triads. What exactly does CIA Triad mean?
3 Pillars of Security
Confidentiality, Integrity & Availability; CIA Triad forms the pillars of cybersecurity. What each of this refers to?
Confidentiality
means limiting access of information to authorised users and restricting access from unauthorised personals.
Numerous attacks targeting confidentiality are, social engineering, and network sniffing.
Integrity
Maintaining the accuracy, validity and completeness of the information is referred to as Integrity.
Authenticity and Non-Repudiation are two closely related concepts. Non-Repudiation means that no personal denies his/her actions for example change in data / information or even creation or deletion of the particular information.
Malicious code that intends to modify information without authorisation or via unauthorised access that violates Confidentiality and thus risking the integrity of particular information.
Availability
Managing the information in such a way that it is available to authorised person when it is required is known as Availability.
Some recent examples of malicious availability threats include RAT Malware, Ransomware and Denial of Service attacks, PLC weaponisation etc.
Each of these will be discussed in detail, and you will get to know what kind of attacks are there to exploit different vulnerabilities to acquire unauthorised access compromising integrity of the information and affecting availability.