SlideShare a Scribd company logo
1 of 4
Confidentiality
 Information is kept confidential or secret from unauthorized users or from
 people who are not allowed to see it. For example, credit card transactions
 over the internet. As a transaction is made the credit card number is encrypted
 by restricting access to the credit card number and users information.


Integrity
 Information can not be modified without detection. Integrity ensures that the
 data stored is correct and that no one has altered the data in any way. Data
 sent back and forth use protection methods such as hashing and checksums.
 The data needs to be protected from modification and deletion by
 unauthorized users as well as user mistakes such as file deletion.
Availability
 The information created and stored by an organization needs to be available
 to authorized users and applications. If data is lost it can be restored using
 Availability. Information needs to be be accessible and well taken care of.
 Things should be maintained such as redundancy, backups and recovery
 features. There should also be some good protection against threats placed
 on the system as well.

 Technicians should also be trained in proper disaster recovery and backup
 plans.

 Environmental issues are also a large part of Availability, issues such as
 extreme cold and extreme heat can cause big problems with sensitive
 equipment.
It takes an equal
combination of all
three, confidentiality,
integrity            and
availability to have a
properly        running
infrastructure whereas
security is directly in
the middle of the triad.

More Related Content

Viewers also liked

Vallourec Tuberie De Saint Saulve
Vallourec Tuberie De Saint SaulveVallourec Tuberie De Saint Saulve
Vallourec Tuberie De Saint SaulveE. Duverger
 
Торговый дом «Априори»: Неповторимый интерьер
Торговый дом «Априори»: Неповторимый интерьерТорговый дом «Априори»: Неповторимый интерьер
Торговый дом «Априори»: Неповторимый интерьерannelee2011
 
San francisco, 2011 district attorney election graphs
San francisco, 2011 district attorney election graphsSan francisco, 2011 district attorney election graphs
San francisco, 2011 district attorney election graphskkellyfv
 
Beyond the Slide Deck: Creating & Delivering Great Presentations
Beyond the Slide Deck: Creating & Delivering Great PresentationsBeyond the Slide Deck: Creating & Delivering Great Presentations
Beyond the Slide Deck: Creating & Delivering Great PresentationsReadyTalk
 
Nyhetsbrev Kina Samarbeid 2009
Nyhetsbrev Kina Samarbeid 2009Nyhetsbrev Kina Samarbeid 2009
Nyhetsbrev Kina Samarbeid 2009meditnor
 
Using Games To Teach Tips
Using Games To Teach TipsUsing Games To Teach Tips
Using Games To Teach TipsC3 SoftWorks
 

Viewers also liked (10)

Vallourec Tuberie De Saint Saulve
Vallourec Tuberie De Saint SaulveVallourec Tuberie De Saint Saulve
Vallourec Tuberie De Saint Saulve
 
001
001001
001
 
SOGEPSA: Ley
SOGEPSA: LeySOGEPSA: Ley
SOGEPSA: Ley
 
Where To Go For Answers
Where To Go For AnswersWhere To Go For Answers
Where To Go For Answers
 
Judit Jorba
Judit JorbaJudit Jorba
Judit Jorba
 
Торговый дом «Априори»: Неповторимый интерьер
Торговый дом «Априори»: Неповторимый интерьерТорговый дом «Априори»: Неповторимый интерьер
Торговый дом «Априори»: Неповторимый интерьер
 
San francisco, 2011 district attorney election graphs
San francisco, 2011 district attorney election graphsSan francisco, 2011 district attorney election graphs
San francisco, 2011 district attorney election graphs
 
Beyond the Slide Deck: Creating & Delivering Great Presentations
Beyond the Slide Deck: Creating & Delivering Great PresentationsBeyond the Slide Deck: Creating & Delivering Great Presentations
Beyond the Slide Deck: Creating & Delivering Great Presentations
 
Nyhetsbrev Kina Samarbeid 2009
Nyhetsbrev Kina Samarbeid 2009Nyhetsbrev Kina Samarbeid 2009
Nyhetsbrev Kina Samarbeid 2009
 
Using Games To Teach Tips
Using Games To Teach TipsUsing Games To Teach Tips
Using Games To Teach Tips
 

Similar to Confidentiality, Integrity and Availability (CIA

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxcomstarndt
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxSteveNgigi2
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Dr. Prashant Vats
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
 

Similar to Confidentiality, Integrity and Availability (CIA (20)

Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Information security
Information securityInformation security
Information security
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Data security
Data securityData security
Data security
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Computer security
Computer securityComputer security
Computer security
 
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docxDATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
DATA PROTECTION IMPACT ASSESSMENT TEMPLATE (ODPC).docx
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Data Security
Data SecurityData Security
Data Security
 
Office management
Office management Office management
Office management
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 

Confidentiality, Integrity and Availability (CIA

  • 1.
  • 2. Confidentiality Information is kept confidential or secret from unauthorized users or from people who are not allowed to see it. For example, credit card transactions over the internet. As a transaction is made the credit card number is encrypted by restricting access to the credit card number and users information. Integrity Information can not be modified without detection. Integrity ensures that the data stored is correct and that no one has altered the data in any way. Data sent back and forth use protection methods such as hashing and checksums. The data needs to be protected from modification and deletion by unauthorized users as well as user mistakes such as file deletion.
  • 3. Availability The information created and stored by an organization needs to be available to authorized users and applications. If data is lost it can be restored using Availability. Information needs to be be accessible and well taken care of. Things should be maintained such as redundancy, backups and recovery features. There should also be some good protection against threats placed on the system as well. Technicians should also be trained in proper disaster recovery and backup plans. Environmental issues are also a large part of Availability, issues such as extreme cold and extreme heat can cause big problems with sensitive equipment.
  • 4. It takes an equal combination of all three, confidentiality, integrity and availability to have a properly running infrastructure whereas security is directly in the middle of the triad.