Hello friends, welcome to Tek Jargon. My name is tender galzy, so today we'll  learn new term related to technology. So without wasting any time, let's get  started. In today's video, we'll talk about the goals of information security. So  let's see what terms we'll be talking about, or what exactly are the goals of  information security. So we'll talk about the CIA triad. We'll talk about  confidentiality, integrity, availability. So these are few terms related to the goals  of information security. So what exactly is CIA triad? CIA, as we often hear, is  commonly referred to the Central Intelligence Agency. But in today's video, we  are not talking about the CIA of us, we'll be talking about the CIA related to  information security. So CIA basically is the foundation, or the guiding security  model for implementation of security policies. If you have gone through the last  video, we had talked about information security as a framework. So we know  that when we want to implement information security, there should be a  framework that can help us implement the best practices and security controls in an organization or anywhere where information needs to be secured. So CIA  triad is that foundation or the guiding model which helps in implementing the  security or implementing the information security policies. Now CIA basically  refers to confidentiality, integrity and availability. C stands for confidentiality, I for  integrity and A for availability. So this is nowhere related to the Central  Intelligence Agency CIA. As you can see, these are the three components that  completes the information security framework. Any one component you remove  the information security framework would be incomplete. Okay? There would be  something missing then. So each of the component is equally important when  we are designing a information security framework. So let's understand these  terms one by one away. So what exactly is confidentiality? In terms of  information security, the confidentiality is something that ensures only authorized users have access to critical information and prevents access to unauthorized  users. That means, if we have some information which is critical, and if we have  ensured that confidentiality is in place, then only the authorized users would be  having access to that particular information, and it will also prevent the access to unauthorized users. So any control, any security measure, any best practices  we have implemented that ensures confidentiality would automatically ensure  that the information is secure from unauthorized access. Confidentiality also  says on the need to know basis, things will work so any information that we  have will be available only on the need to know basis, only those authorized to  know the content should be given access. That is how confidentiality helps us  secure the information you need something, and when you need only, then you  will be having the access to the information. Confidentiality is implemented using various security mechanisms like access control list, usernames, passwords and encryption. Now access control list will be talking about that in the upcoming  videos, but in simple terms, it means that we are defining a list of access  controls who should have access and what kind of access to be given to that 

particular user. Is defined through the access control list usernames and  passwords we are already aware of. So any count you have online or on the  computer, if you want to secure it from anyone else to access, you generally  configure a username and password, a password which is known only to you, so that no one else can access your information. And encryption is again, another  mechanism through which confidentiality can be implemented. Encryption helps  in converting a clear data, a clear text, into some unreadable format, so that only the person who has encrypted would be able to read it back in the clear form.  Okay. Now again, encryption and access control list. We will be discussing this  in the upcoming videos, so if the things are not yet clear, just wait for the  upcoming videos and it will be more clear. Okay. But in short, confidentiality is  achieved through these security mechanisms. What is integrity? Now? Integrity  is something that ensures that information or the data is prevented from getting  tampered, modified or altered without proper authorization. So that means, if  there is some critical information, it should not be tampered. No one should be  able to modify or make changes with the information without having proper  authorization. Only the person who has the authorization, only the user who is  authorized to modify data, should be able to modify the data, and this is ensured through integrating any data sent by a sender to a receiver should be received  in its original form without any alteration or tampering. So if I am sending a mail  to some other user, the receiver on the other side should receive the same mail  as sent by the sender. It should not be a case that I have sent a mail with some  content, but on the receiving side, by the time the receiver receives it, the  content of the mail has already been changed. That could be a problem. So  Integrity ensures that the data which is being sent by the sender to the receiver  is not tampered. Now is integrity achieved? It can be achieved or implemented  using security mechanisms like hashing and encryption. Encryption we talked  about in the previous topic also evidence. Reality, same encryption can also  help in achieving integrity of data also and other mechanisms like hashing. Now  hashing is again a kind of encryption, so once we are able to encrypt the data,  convert the data into a non readable format, any other user, apart from the  actual receiver, would not be able to read it, and hence not able to modify it. The next term of the CIA trade is availability. Availability ensures the information or  data is accessible to authorized users in a timely manner. We learned that  Confidentiality ensures that the information is accessible only to the authorized  users, but it should be available in a timely manner. So when I need it should be  accessible to me, and that is achieved through availability concept. Availability  also ensures that the data is always available. Should not be a case that there is a specific time frame when the data is accessible, no if the data is present, then  all the authorized users should be able to access it as and when needed. On the need to know basis, the backup of critical data and less downtime during  upgrades, along with reliable hardware helps in maintaining availability of data. 

So how is availability achieved? It is achieved by ensuring that we have backup  of critical information. So any data, any information that is critical to the  organization or to the user, there should be proper backups of those particular  data. There should not be only single copy. And also, if there are any updates  being done, or there are any upgrades happening on the organization level, on  the infrastructure level, basically, let's say your computer is installing some  updates, so it should ensure that the update happens in as less possible time as possible, so that there is the least possible downtime. Because if there is a  downtime, that means the data is not available for that particular time period. So the lesser the downtime during those updates, the more availability of data is  maintained, also the hardware should be reliable. So if your data is more critical, the more reliable hardware you should be using for creating backups of data. So if you're talking in terms of an organization, the computers, the servers which  are being used, should be of reliable resources, not just anything. So what are  the security controls for ensuring availability controls like redundant systems,  systems which have least possible downtime and data backups and data  recovery plans. So if an organization has these security controls, then the data  can be available as and when needed. It ensures that the availability of data is  maintained. So in short, confidentiality helps in keeping secrets safe. So if we  have some data which is it needs to be secured, the confidentiality will help in  ensuring the safety of that data, or ensuring that it is safe. Integrity ensures that  the data is accurate. That means there are no changes made to the data. So  this factor would be achieved through integrity and availability. We can say the  resilience improves the availability. So whatever infrastructure we are using for  storing the information, it should be resilient. The more resilient the hardware or  the process of maintaining the data, the less would be the chance of any mis  happenings. So more resilience will improve the availability. So if we want to  understand this, the three pillars of the CIA triad, or the three components of CIA triad, let's consider example of a bank ATM. Now everyone has used a bank  ATM, and it helps the user to access the bank balance and other information,  and also to the ATM we can access the cash. ATM is an example that covers all  these three principles of the CIA triad. Now, how it is achieved? Let's understand ATM provides confidentiality by ensuring that you have a two factor  authentication authentication method, like your pin and also the physical card,  so you can interact with the ATM only when you have your debit card or your  ATM card and along with the pin. So not just the ATM card or not just the pin,  would be useful if you want to interact with the ATM. You can do that only if you  have both of the authentication factors. So in this way, ATM provides the  confidentiality factor. Once you provide both the authentication method, your  confidentiality is checked and then you are able to access the ATM. When you  talk about integrity, how does the ATM enforce integrity? Let's understand so any transfers or withdrawals that you make via the ATM are reflected in your account

in a correct manner. So that means if you are making a transaction using the  ATM. The same is reflected in your account statement in the correct manner. It's  not modified. It's not tampered in that ways. The ATM ensures the integrity of the transactions. The ATM also provides the availability factor, because it is in a  public place and is accessible even when the bank is closed. So even if you  need some cash in the midnight you can get that through the ATM. So the banks have a limited time frame of working, but the ATMs are 24 by seven, so that  ensures the availability factor. So we see that ATM is one of the examples where in the confidentiality, integrity and availability, all three are implemented now for  different organizations or different users. The importance of one of the factors  can be more as compared to the other factors of the CIA triad. So if an  organization has some proprietary information, then confidentiality is more  important as compared to the integrity or availability. So for any organization, the more confidential the information is, or more proprietary information it has, more  stress would be given on the confidentiality factor as compared to integrity. And  availability. Now this doesn't mean that the integrity and availability factor does  not exist. It does exist, but the only point is confidentiality factor would have  more importance for the organization in other cases, like if you take example of  banks. For the banks, integrity of the data is more important. So whatever  transactions are being made in the bank, whether online or offline, the integrity  of that transaction should be maintained properly. So the integrity factor has  more importance as compared to availability or confidentiality. So integrity has  the first priority. Then comes the confidentiality and then we have the availability  factor, because we know that the bank works in a limited time frame. It opens in  the morning, it closes by the evening. So availability is not the factor for them.  The more important factor for the banks would be integrity or confidentiality of  the information. So likewise, every other organization, depending on what kind  of information they are having, what information they are trying to secure, one of the factors would have more priorities as compared to the other factors. But in  overall, wherever there is information security, all these three factors would  come into picture automatically and everyone each of the factor would be  important. So in today's video, we discussed about the CIA triad, wherein we  talked about the three components of CIA that is confidentiality, integrity and  availability. These are the three important principles of information security  model. Like, if you enjoyed watching the video, do like and share the video, and  don't forget to subscribe and press the bell icon to receive updates about the  upcoming videos. And in case of any feedbacks or any comments, you can drop a mail at Tekargon.tj@gmail.com, so that's all for this video. Take care and bye,  bye. 



最后修改: 2025年01月27日 星期一 08:05