Information security concepts

CIA Triad

The CIA triad of confidentiality, integrity, and availability is at the heart of information security.

Confidentiality

Confidentiality is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes. Examples of confidentiality of electronic data being compromised include laptop theft, password theft, or sensitive emails being sent to the incorrect individuals.

While similar to "privacy," the two words aren't interchangeable:

BASIS FOR COMPARISON

PRIVACY

CONFIDENTIALITY

Meaning

The state of being secluded is known as Privacy.

Confidentiality refers to the the situation when it is expected from someone that he will not divulge the information to any other person.

What is it?

It is the right to be let alone.

It is an agreement between the persons standing in fiduciary to maintain the secrecy of sensitive information and documents.

Concept

Limits the access of the public.

Prevents information and documents from unauthorized access.

Applies to

Individual

Information

Obligatory

No, it is the personal choice of an individual

Yes, when the information is professional and legal.

Integrity

Integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle. This means that data cannot be modified in an unauthorized or undetected manner.

Availability

Availability means the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system, essentially forcing it to shut down.

Authentication/Authorization concepts

Authentication

Authorization

Determines whether users are who they claim to be

Determines what users can and cannot access

Challenges the user to validate credentials (for example, through passwords, answers to security questions, or facial recognition)

Verifies whether access is allowed through policies and rules

Usually done before authorization

Usually done after successful authentication

Generally, transmits info through an ID Token

Generally, transmits info through an Access Token

Generally governed by the OpenID Connect (OIDC) protocol

Generally governed by the OAuth 2.0 framework

Example: Employees in a company are required to authenticate through the network before accessing their company email

Example: After an employee successfully authenticates, the system determines what information the employees are allowed to access

Last updated