The document discusses the CIA triad, which consists of Confidentiality, Integrity, and Availability, as essential components of information security. It also highlights the importance of Critical Infrastructure Security (CIS) in protecting vital systems and networks, with examples of cyber attacks on various sectors such as energy, dams, and transportation. The document emphasizes the need for organizations to implement security measures to safeguard against potential threats.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1 views
Unit 1-D
The document discusses the CIA triad, which consists of Confidentiality, Integrity, and Availability, as essential components of information security. It also highlights the importance of Critical Infrastructure Security (CIS) in protecting vital systems and networks, with examples of cyber attacks on various sectors such as energy, dams, and transportation. The document emphasizes the need for organizations to implement security measures to safeguard against potential threats.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7
Unit 1-D
Cyber Security CIA Triad
Confidentiality, Integrity, and Availability.
These are the three core components of the CIA triad.
CIA triad is an information security model meant to guide
an organization’s security procedures and policies. CIA triad has three components:
Confidentiality: Confidentiality has to do with keeping an
organization’s data private. This often means that only authorized users and processes should be able to access or modify data.
Integrity: Integrity means that data can be trusted. It should
be maintained in a correct state, kept so that it may not be tampered with, and should be correct, authentic, and reliable.
Availability: Data should be available to authorized users
whenever they require it. This means keeping systems, networks, and devices up and running.
DDoS (Distributed Denial of Service) attacks rely on limited
availability, for example. For this reason, creating a DDoS response plan and redundancy in your systems is a way of ensuring availability. E-Commerce site –Case study Confidentiality: When you log in, you’re asked for a password. If it’s been a while since your last log-in, you may be asked to input a code that’s been sent to you or some other form of two-factor authentication.
Integrity: Data integrity is provided by making sure
your purchases are reflected in your account and allowing you to contact a representative if there’s a discrepancy.
Availability: You can log into your account whenever
you want, and you may even be able to contact customer support at any time of the day or night. Critical Infrastructure Security(CIS)
Critical infrastructure security is the area of protection of
systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
In the United States, the Department of Homeland Security
(DHS) has identified 16 sectors involving critical infrastructure, including energy, communications, transportation, financial services, food and agriculture. Some Examples of CIS The Energy Services Sector –A cyber attack in 2015 took out the energy grid in Ukraine for more than 225,000 people by using spear phishing emails. According to United States government officials, none of the industrial power grids can be connected to the Internet to prevent cyber-attacks from occurring. The Dams Sector-In 2016, an Iranian nation state committed a cyber-attack against the United States at the Rye Brook Dam in New York. The hackers accessed industrial control systems within the dam but were fortunately unable to release the water behind the dam due to scheduled maintenance. However, this could have been a disaster waiting to happen with just a few clicks. The Water and Wastewater Systems Sector-
In 2016, hackers took control of US water authority
company’s cellular routers for an extended period. They were able to rack up a big bill in usage – roughly from $300 per month to $45,000 in December and $53,000 in January.
The Transportation Systems Sector
Most recently, the San Francisco light rail system became infected with malware viruses which took its systems offline.