top of page
Master Rumbler

Confidentiality, Integrity and Availability

Updated: Jul 16, 2023

The CIA concept, in the context of information security, refers to three fundamental principles: Confidentiality, Integrity, and Availability. These principles serve as a framework for safeguarding information and ensuring its proper handling.

 

CONFIDENTIALITY


This principle focuses on maintaining the privacy and secrecy of information, ensuring that it is accessible only to authorized personnel or machines. Confidentiality prevents unauthorized access, disclosure, or theft of sensitive data.


Example 1: Imagine you have a personal email account, and you want to keep your emails confidential. To ensure confidentiality, you might use encryption techniques or secure your account with a strong password, so only you can access your emails and prevent unauthorized parties from reading them.


Example 2: Think about having a secret diary. You wouldn't want anyone else to read what you write in it, right? So you might keep it hidden in a secure place, like under your bed or in a locked drawer. That way, only you can access and read what's written in your diary.


 

INTEGRITY


Integrity ensures that information remains accurate, complete, and unaltered throughout its lifecycle. It involves protecting data from unauthorized modifications, deletions, or any other form of unauthorized tampering. This is about making sure that information is accurate and hasn't been changed or tampered with in any way.


Example 1: When you download software from a trusted website, you want to ensure its integrity. Software developers often provide cryptographic hashes (such as MD5 or SHA-256) alongside the download link. By calculating the hash of the downloaded file and comparing it to the provided hash, you can verify that the file has not been modified during transit and that its integrity remains intact


Example 2: Imagine you have a school assignment that you worked really hard on. You want to make sure that it doesn't get changed or modified by someone else. So you might put your name on it and hand it directly to your teacher, instead of leaving it somewhere where someone could easily access it and make changes

 

AVAILABILITY

Availability focuses on making information accessible and usable when needed by authorized users. It ensures that systems, networks, and data remain operational, without interruptions or unauthorized denial of service. This is about making sure that information is accessible when you need it. It means that the information is there and ready to be used.


Example 1: Online banking services require high availability. Banks implement redundant servers, backup systems, and disaster recovery plans to ensure that their services remain accessible even during unexpected events such as power outages or hardware failures. This ensures that customers can access their accounts and perform transactions whenever they need to.


Example 2: Let's say you're studying for a test, and you need to use a book from the library. You expect the book to be available and on the shelf when you go to find it. If the library had a system failure or misplaced the book, you wouldn't be able to access the information you need. So, it's important to have systems in place to ensure that the book is always available when you need it.


 

By following the CIA concept, organizations and individuals can establish a strong foundation for information security, protecting sensitive data, maintaining its accuracy, and ensuring its availability to authorized users while mitigating risks associated with unauthorized access, modifications, or service interruptions.


Remember, the CIA concept helps us understand how to protect information. We want to keep things confidential, ensure that information is accurate and hasn't been changed, and make sure that information is available when we need it. By following these principles, we can help keep our personal information, schoolwork, and other important data safe and secure.

25 views0 comments

Recent Posts

See All

Comments


bottom of page