Goals of Cyber Security

Goals of Cyber Security

The goal of Cybersecurity is to safeguard information from being stolen, negotiated or stormed. Cybersecurity can be taken care of via at least one of three goals-

  1. Protect the confidentiality of data.
  2. Preserve the integrity of data.
  3. Assist the availability of data for permitted users.

These goals sum up to form the confidentiality, integrity, and availability (CIA) triad, the foundation of all security systems. The CIA triad is a security prototype planned to guide policies for data security within the premises of a company or organization. This model is also known as the AIC triad (Availability, Integrity, and Confidentiality). The elements of this triad are considered the most pivotal constituents of security.

The CIA criteria are one that most organizations and companies use when they have installed a new application, created a database or when guaranteed access to some data. For the security of data, these security goals must always be taken care of. These security policies work together; therefore, it can be wrong to overlook one policy.

The CIA triad 

1. Confidentiality

Confidentiality is roughly equivalent to the privacy and avoids unauthorized disclosure of information. It involves the protection of data, furnishing access to those who are permitted to see it while prohibiting others from learning anything about its content. It prevents essential information from reaching the wrong hands while making sure that real users can obtain it. Data encryption is a good illustration of ensuring confidentiality.

  • Encryption

Encryption is a technique of converting information to make it unreadable to illicit users by using an algorithm. The converting of data uses a secret key (an encryption key) so that the converted data can only be read by using another secret key (decryption key). It protects sensitive data such as credit card figures by encoding and converting data into ciphertext. This translated data can only be read by decoding it. Asymmetric-key and symmetric keys are the two primary types of encryption.

  • Access control

Access control defines rules and procedures for limiting access to a system or physical or virtual assets. It is a method by which users are granted access and certain boons to systems, resources or information. In access control systems, users must present credentials before they can be granted access similar to a person’s name or a computer’s periodical number. In physical systems, these credentials may come in enormous forms, but credentials that can not be transferred deliver the most security.

  • Authentication

Authentication is a process that ensures and confirms a stoner’s identity or part that someone has. It can be done in several different ways, but it’s generally grounded on a combination of-

  1. commodity the person has (like a smart card or a radio key for storing secret keys),
  2. commodity the person knows (like a password),
  3. commodity the person is (like a fingerprint).

Authentication is necessary for every organization because it enables associations to keep their networks secure by permitting only authenticated users to acquire their protected assets. These assets may include computer systems, networks, databases, websites, and other network-based apps or services.

  • Authorization

Authorization is a security mechanism that permits one to do or have something. It is used to find out if a person or system is allowed access to assets, based on an access control policy, including computer programs, files, services, data, and application features. It is usually led up by authentication for user identity verification. System directors are generally assigned authorization situations covering all system and user assets. During authorization, a system confirms an authenticated user’s access laws and either grants or refuses resource access.

  • Physical Security

Physical security describes measures designed to deny unauthorized access to IT means like installations, equipment, personnel, data, and other properties from damage. It protects these means from physical pitfalls including theft, vandalism, fire, and natural disasters.

2. Integrity

Integrity refers to the styles for icing that data is authentic, accurate, and shielded from unauthorized user revision. It is the property that the information has not been altered unauthorized, and that source of information is genuine.

Tools for integrity

  • Backups

Backup is the periodic archiving of data. It is a process of making copies of data to use if the original data is lost or destroyed. It is also used to make copies for nonfictional purposes, similar to longitudinal studies, statistics, or literal records or to meet the conditions of a data retention policy. Many apps especially in a Windows environment, produce backup files using the.BAK file extension.

  • Checksums

A checksum is a numerical value used to confirm the integrity of a file or a data transfer. In other words, it is the calculation of a function that maps the contents of a file to a numerical value. These are usually used to compare two sets of data to verify that they are the same. A checksum function relies on the whole content of a file. It is designed in a way that indeed a small change to the input file (such as flipping a single bit) is likely to affect different output values.

  • Data Correcting Codes

It is a process for storing data in such a way that small changes can be fluently detected and automatically corrected.

3. Availability

Availability is the property in which data is accessible and adjustable in a timely fashion by those authorized to do so. It guarantees dependable and constant access to our sensitive data by sanctioned people.

Tools for Availability

  • Physical Protections
  • Computational Redundancies

Physical Protections

Physical safekeeping means keeping information available even in the event of physical challenges. It ensures that sensitive and critical information technology is housed in secure areas.

Computational redundancies

It is applied as fault-tolerant against accidental faults. It protects computers and storehouse biases that serve as fallbacks in the case of failures.

Leave a Reply

Your email address will not be published. Required fields are marked *