Topic > The Holy Trinity of Data Security: What You Need to Know About the CIA Triad

The CIA Triad is the most popular reference model for information security and assurance which stands for confidentiality, integrity and availability. Sometimes affectionately called the Holy Trinity of data security, the CIA triad is also called the AIC (availability, integrity, confidentiality) triad by some InfoSec experts to avoid confusion with the Central Intelligence Agency. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay In this template, privacy refers to a set of directives that prevent data from being exposed to unauthorized parties by regulating and limiting access to it. Integrity describes the rules that preserve the reliability and integrity of data and prevent unauthorized users from tampering with it. And availability promotes a state in which authorized people are granted reliable access to information. Confidentiality In the general context, confidentiality is about preventing the disclosure of data to unauthorized parties. But in strict terms, it also seeks to keep the identity of authorized parties involved in data sharing and storage private and anonymous. Keeping the identity of the parties involved confidential adds to the CIA's overall trifecta. Since malicious actors cannot reliably reconnoitre and identify the target, they must target network participants randomly. This effectively increases the costs of compromising the system and increases its overall security. Standard measures taken to ensure privacy include, but are not limited to, encryption, passwords, two-factor authentication, biometric verification, security keys, and more. Some of the challenges that could compromise confidentiality are: encryption cracking; Man-in-the-middle attacks on plaintext data; Internal leaks where data is not end-to-end encrypted; Doxxing of data subjects' private information; Yobicash manages and guarantees confidentiality using an Elliptic-based end-to-end encrypted system; Curve Integrated Encryption Scheme (ECIES). This encryption system is only vulnerable to quantum attacks, which will still happen in ten or twenty years. Yobicash credentials are anonymous and untraceable, so the parties involved know exactly what is needed for a one-time data transfer. Public key reuse is also prohibited and enforced using anonymous credentials. Additionally, the use of public key cryptography eliminates the need to rely on insecure communication channels to create shared keys. Integrity preserves the authenticity of data throughout its lifecycle by ensuring that unauthorized parties are unable to tamper with it. It also ensures that data does not get corrupted due to inadvertent software or hardware malfunctions. Standard measures to ensure integrity include access controls, cryptographic checksums, uninterrupted power supplies, and backups. Some of the challenges that could jeopardize integrity are: tampering with plaintext data on the fly in a man-in-the-middle attack; Compromising a cloud server where end-to-end encryption is not used; Dropping or redirecting packets on the fly in a man-in-the-middle attack; Yobicash uses checksums to check whether transactions have been illegitimately modified after they were created. Authenticated data encryption allows the same for ciphertexts. Furthermore, nodes and clients can always recover entire versions of transactions altered by other nodes and clients, which.