Actions

Basic Concepts: Difference between revisions

From Jedisaber Wiki

No edit summary
No edit summary
Line 1: Line 1:
=== CIA Triad ===
[[File:Sec_objectives.jpg]]
[[File:Sec_objectives.jpg]]


The three key objectives of cybersecurity programs are confidentiality, integrity, and availability.
The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability.
 
- Confidentiality: Unauthorized users don't gain access.
(Firewalls, ACL's, encryption)
 
- Integrity: No unauthorized modifications.
(Hashing, monitoring)
 
- Availability: The system is up when users need it.
(fault tolerance, clustering, backups)
 
Nonrepudiation: Someone who performed an action can't deny performing said action
(Digital Signatures)
(Not a part of CIA, but also important.)
 
 
 
=== DAD Triad ===

Revision as of 23:48, 5 June 2025

CIA Triad

The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability.

- Confidentiality: Unauthorized users don't gain access. (Firewalls, ACL's, encryption)

- Integrity: No unauthorized modifications. (Hashing, monitoring)

- Availability: The system is up when users need it. (fault tolerance, clustering, backups)

Nonrepudiation: Someone who performed an action can't deny performing said action (Digital Signatures) (Not a part of CIA, but also important.)


DAD Triad