Security is protection or resilience against, probable harm. In context of information technology, information security measures aim achieve anyone of below

  • Protect data confidentiality
  • Preserve data integrity
  • Promote data availability by authorized entity

The above listed aims, are summarized or referred as CIA triad or the confidentiality, integrity, availability triad, and forms basis of all security programs.

The CIA Triad

  • A triad consists three pillars, as  
    • confidentiality
    • integrity
    • availability
  • It forms the core of information security.
  • Other principles like non-repudiation, accountability are proposed to be added
  • Confidentiality refers to property of the system wherein the information is not made accessible to entities or processes which are unauthorized
  • Integrity – maintaining and assuring accuracy and completeness of data over its entire life-cycle
  • Availability – refers to information being made available as per requirement of authorized entity

Non-repudiation – one party of a transaction cannot deny having received a transaction nor can other party deny having sent a transaction

Menu