SF101 Core Security Principles - ITPro

CIA Triad

CIA Triad Definition
  • [i] CIA Triad) - (definition:: The three pillars of information security, confidentiality, integrity, and availability) - (subject:: Cybersecurity

CIA Triad

These are the core principles that guide the implementation of security.

CIA Triad
Confidentiality
Availability
Integrity

Confidentiality

Confidentiality Definition
  • [i] Confidentiality) - (definition:: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information) - (subject:: Cybersecurity

Integrity

Integrity Definition
  • [i] Integrity) - (definition:: Guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity) - (subject:: Cybersecurity

Availability

Availability Definition
  • [i] Availability) - (definition:: Ensuring timely and reliable access to and use of information) - (subject:: Cybersecurity

Confidentiality:

Confidentiality Examples

An example of ensuring that authorized users have access to information is through using Encryption and Decryption, where only specified users can access information through the use of a Cipher Key.

Integrity

Integrity is ensuring that data has not been modified or altered.

Version Control & Change Management

A perfect example of Version Control is Git. In the context of Git, version control allows developers to track changes made to the codebase over time, collaborate efficiently, and revert back to previous states if necessary. Here's a brief overview of how it works:

This is a simple hash function explanation:

Plaintext
Hashed Text
Hash Function

Availability

Ensuring that authorized users have access to information when needed.

In a nutshell, these concepts are designed to ensure that even if one system fails, another is available to take its place, keeping the service operational. For instance, if a server crashes, a backup server can take over, minimizing downtime for users.

Access Control

Access control is one of the easiest ways to check all of the core security principles at once. It involves managing who has access to what, both physically (e.g., access to a server room) and digitally (e.g., user permissions in a software application).

Principle of Least Privilege

The principle of least privilege states that users should only be given the minimum level of access required to perform their job duties. This helps prevent unauthorized access and potential misuse of privileges.