Basic Concepts: Difference between revisions
From Jedisaber Wiki
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
=== CIA Triad === | === CIA Triad === | ||
[[File:Sec_objectives.jpg]] | [[File:Sec_objectives.jpg|600px|thumb|center]] | ||
The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability. | The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability. | ||
| Line 21: | Line 21: | ||
=== DAD Triad === | === DAD Triad === | ||
[[File:Sec_DAD.jpg|600px|thumb|center]] | |||
The the three key threats to cybersecurity efforts: disclosure, alteration, and denial. | |||
- Disclosure: exposure of sensitive information to unauthorized individuals; violation of the principle of confidentiality | |||
(Attacks on the system, misconfigured credentials, lost devices) | |||
- Alteration: unauthorized modification of information; violation of the principle of integrity | |||
(fraudulent transactions, typos, bit flip due to power loss) | |||
- Denial: disruption of an authorized user's legitimate access to information; violation of the principle of availability | |||
(DDoS, failure of a server) | |||
Revision as of 23:57, 5 June 2025
CIA Triad

The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability.
- Confidentiality: Unauthorized users don't gain access. (Firewalls, ACL's, encryption)
- Integrity: No unauthorized modifications. (Hashing, monitoring)
- Availability: The system is up when users need it. (fault tolerance, clustering, backups)
Nonrepudiation: Someone who performed an action can't deny performing said action (Digital Signatures) (Not a part of CIA, but also important.)
DAD Triad

The the three key threats to cybersecurity efforts: disclosure, alteration, and denial.
- Disclosure: exposure of sensitive information to unauthorized individuals; violation of the principle of confidentiality (Attacks on the system, misconfigured credentials, lost devices)
- Alteration: unauthorized modification of information; violation of the principle of integrity (fraudulent transactions, typos, bit flip due to power loss)
- Denial: disruption of an authorized user's legitimate access to information; violation of the principle of availability (DDoS, failure of a server)
