SlideShare a Scribd company logo
1 of 2
Source: http://www.brighthub.com/computing/smb-security/articles/29153.aspx

Information Security Concepts: Confidentiality, Integrity, Availability & Authenticity

Article by Lee Clemmer; Edited & published by Brett on May 5, 2010; (Edited version for class)

In information security theory we encounter the acronym CIA which stands for Confidentiality,
Integrity, and Availability. We will examine each of these concepts, and discover how we may use
them. Also identified and added is a 4th concept Authenticity.

Introduction
In information security theory we encounter the acronym CIA--which does not stand for a governmental
agency--but instead for Confidentiality, Integrity, and Availability. So why are these concepts important?"
Well, without any one, or in fact all of them, business operations, transactions, and communications can
become unreliable, untrustworthy, and uncertain.

Confidentiality
This means, at the core of the concept, that the data is hidden from those that are not supposed to see
it. We can accomplish Confidentiality in a number of ways. These methods are complementary. First,
require strong authentication for any access to data. Second, use strict access controls. In
communications only the sender and intended recipient should be able to access the data. In file
systems and data repositories, only the creator and intended users can access the data. Third, ensure
encryption of the data so that it cannot be intercepted, and cannot be accessed during transmission or
transport. Encryption is frequently what students of confidentiality think of first. While encrypting data is
surely a way of keeping it confidential, it's not the only way.

Integrity
Integrity as a concept means that there is resistance to alteration or substitution of data, and/or that such
changes are detected and provable. The information should not be changed except by an authorized
agent. This usually involves the use of checksums, one-way hashes, or other algorithmic validation of
the data. Whether the data might be changed by accident or malice, preventing that change is the
foremost concern, and detecting if it has changed is second. Integrity can be maintained at many levels,
from the hardware all the way to the application logic.

Availability
For our data to be of use to us, it has to be accessible when and where we need it. Therefore part of the
puzzle is how to keep our data available. Attacks or accidents can bring down systems. Data can be
overwritten, deleted, or destroyed. Denial of Service attacks can make otherwise fast-access systems
run like cold molasses. High Availability solutions, including load balancing, fail-over, and quick backup
and restoration are all involved. In my opinion these topics are network and systems architecture
concerns, operations concerns, and not truly a primary security component. I think we ought to, when
considering security issues, place Authenticity as a higher priority than Availability! If my data is
available 24/7 but it's not the data I believed it was, then having it available is pointless.

Authenticity
At first glance it might seem that Authenticity is included in the concept of Integrity. Integrity is more
specifically about the content of the data itself. Authenticity means that when I get an order from Bob, it's
verifiably Bob that's placing the order. The order (the data) is of no value if Bob didn't want to place it.
So, Authenticity involves assurance that the data was created or sent by the source it appears to be
from. Not verifying authenticity is tied to current problems with spam, e-mail phishing, web site
redirection, browser hijacking, or other attacks such as man-in-the-middle attacks.
Risk Assessment and Risk Mitigation
http://misqe.org/ojs2/index.php/misqe/article/viewFile/31/26
http://www.wikihow.com/Develop-a-Risk-Management-Plan
http://security.isu.edu/ppt/pdfppt/RiskAssessandMitigate.pdf

More Related Content

What's hot

HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
Post-quantum cryptography: facts, myths, and business opportunity
Post-quantum cryptography: facts, myths, and business opportunityPost-quantum cryptography: facts, myths, and business opportunity
Post-quantum cryptography: facts, myths, and business opportunityTuanTrinh53
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Infomration & network security
Infomration & network securityInfomration & network security
Infomration & network securityRajkumar Pawar
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securitybudi rahardjo
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 

What's hot (7)

HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Post-quantum cryptography: facts, myths, and business opportunity
Post-quantum cryptography: facts, myths, and business opportunityPost-quantum cryptography: facts, myths, and business opportunity
Post-quantum cryptography: facts, myths, and business opportunity
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Infomration & network security
Infomration & network securityInfomration & network security
Infomration & network security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 

Similar to CIA & Authenticity - Key InfoSec Concepts

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfannaielectronicsvill
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxtodd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxhealdkathaleen
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxHumphrey Humphrey
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Dr. Prashant Vats
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Information security principles
Information security principlesInformation security principles
Information security principlesDan Morrill
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentationShanonNasoni
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional TatianaMajor22
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfAmeliaJonas2
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 

Similar to CIA & Authenticity - Key InfoSec Concepts (20)

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentation
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Information security
Information securityInformation security
Information security
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Ss
SsSs
Ss
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 

CIA & Authenticity - Key InfoSec Concepts

  • 1. Source: http://www.brighthub.com/computing/smb-security/articles/29153.aspx Information Security Concepts: Confidentiality, Integrity, Availability & Authenticity Article by Lee Clemmer; Edited & published by Brett on May 5, 2010; (Edited version for class) In information security theory we encounter the acronym CIA which stands for Confidentiality, Integrity, and Availability. We will examine each of these concepts, and discover how we may use them. Also identified and added is a 4th concept Authenticity. Introduction In information security theory we encounter the acronym CIA--which does not stand for a governmental agency--but instead for Confidentiality, Integrity, and Availability. So why are these concepts important?" Well, without any one, or in fact all of them, business operations, transactions, and communications can become unreliable, untrustworthy, and uncertain. Confidentiality This means, at the core of the concept, that the data is hidden from those that are not supposed to see it. We can accomplish Confidentiality in a number of ways. These methods are complementary. First, require strong authentication for any access to data. Second, use strict access controls. In communications only the sender and intended recipient should be able to access the data. In file systems and data repositories, only the creator and intended users can access the data. Third, ensure encryption of the data so that it cannot be intercepted, and cannot be accessed during transmission or transport. Encryption is frequently what students of confidentiality think of first. While encrypting data is surely a way of keeping it confidential, it's not the only way. Integrity Integrity as a concept means that there is resistance to alteration or substitution of data, and/or that such changes are detected and provable. The information should not be changed except by an authorized agent. This usually involves the use of checksums, one-way hashes, or other algorithmic validation of the data. Whether the data might be changed by accident or malice, preventing that change is the foremost concern, and detecting if it has changed is second. Integrity can be maintained at many levels, from the hardware all the way to the application logic. Availability For our data to be of use to us, it has to be accessible when and where we need it. Therefore part of the puzzle is how to keep our data available. Attacks or accidents can bring down systems. Data can be overwritten, deleted, or destroyed. Denial of Service attacks can make otherwise fast-access systems run like cold molasses. High Availability solutions, including load balancing, fail-over, and quick backup and restoration are all involved. In my opinion these topics are network and systems architecture concerns, operations concerns, and not truly a primary security component. I think we ought to, when considering security issues, place Authenticity as a higher priority than Availability! If my data is available 24/7 but it's not the data I believed it was, then having it available is pointless. Authenticity At first glance it might seem that Authenticity is included in the concept of Integrity. Integrity is more specifically about the content of the data itself. Authenticity means that when I get an order from Bob, it's verifiably Bob that's placing the order. The order (the data) is of no value if Bob didn't want to place it. So, Authenticity involves assurance that the data was created or sent by the source it appears to be from. Not verifying authenticity is tied to current problems with spam, e-mail phishing, web site redirection, browser hijacking, or other attacks such as man-in-the-middle attacks.
  • 2. Risk Assessment and Risk Mitigation http://misqe.org/ojs2/index.php/misqe/article/viewFile/31/26 http://www.wikihow.com/Develop-a-Risk-Management-Plan http://security.isu.edu/ppt/pdfppt/RiskAssessandMitigate.pdf