CIA TRIAD
Confidentiality
Confidentiality ensures that sensitive information is only available to people who are authorized to access it .
Security Controls for confidentiality data protection :
- Encryption -> Encrypting data with latest encryption mechanism
- Access Control -> LDAP, Managed permission
- Steganography -> Hiding data within data , obscuring the data
Causes of Un-Intentional data disclosure :
- Human Error
- Oversight
- Ineptitude
Violation of Confidentiality Attacks:
- Capturing network traffic
- Stealing password files
- Social Engineering
- Port Scanning
- Shoulder Surfing
- Eavesdropping - Also known as sniffing or snooping attack , secretly listening
- Escalation of privileges
Countermeasures to ensure confidentiality:
- Encryption
- Network traffic paddling
- Rigorous access controls
- Strict Authentication process
- Data classification
- Personnel Training
Integrity
Integrity refers to prevention of un-authorized alterations to the data
Integrity Involves the following:
- Preventing any un-authorized personnel or entity from making modification to the data of any kind.
- Preventing any personnel or entity from accidentally making modification to the data of any kind.
- Set up logging an tracking to track who or what is attempting to access/modify the data
Integrity ensures that data objects and resources remain:
- Unaltered
- Preserved
- Correct
Integrity Violation Attacks:
- All sorts of malware
- Reverse shell codes
- Vulnerable code
- Human Error
Countermeasure:
- IPS/IDS
- Encryption
- Mandatory security awareness training
Availability
Availability ensures that resources are available when authorized users needs access to
Availability Concepts
- Usability
- Accessibility
- Timelines
Attacks and threats
- DOS
- Natural Disaster
- Human error
Countermeasure:
- Load balancers for DOS mitigation
- Backups
- High fault tolerance
Comments
Post a Comment