Basic Concepts: Difference between revisions
From Jedisaber Wiki
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
=== CIA Triad === | |||
[[File:Sec_objectives.jpg]] | [[File:Sec_objectives.jpg]] | ||
The three key objectives of cybersecurity programs are confidentiality, integrity, and availability. | The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability. | ||
- Confidentiality: Unauthorized users don't gain access. | |||
(Firewalls, ACL's, encryption) | |||
- Integrity: No unauthorized modifications. | |||
(Hashing, monitoring) | |||
- Availability: The system is up when users need it. | |||
(fault tolerance, clustering, backups) | |||
Nonrepudiation: Someone who performed an action can't deny performing said action | |||
(Digital Signatures) | |||
(Not a part of CIA, but also important.) | |||
=== DAD Triad === | |||
Revision as of 23:48, 5 June 2025
CIA Triad
The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability.
- Confidentiality: Unauthorized users don't gain access. (Firewalls, ACL's, encryption)
- Integrity: No unauthorized modifications. (Hashing, monitoring)
- Availability: The system is up when users need it. (fault tolerance, clustering, backups)
Nonrepudiation: Someone who performed an action can't deny performing said action (Digital Signatures) (Not a part of CIA, but also important.)

