Chapter -1 Security Principals
Last updated
Last updated
The CIA Triad is a widely used model in information security that represents the three core principles essential for ensuring the security and confidentiality of information. These principles are:
Confidentiality: Ensures that information is only accessible to those who are authorized to access it. This principle helps protect sensitive data from unauthorized access, such as through encryption or access control mechanisms.
Integrity: Ensures that the information remains accurate, consistent, and unaltered unless authorized. Integrity involves protecting data from being modified, corrupted, or deleted, ensuring that it can be trusted.
Availability: Ensures that information and systems are accessible and usable when needed by authorized users. This principle focuses on ensuring that systems are operational and data can be accessed in a timely manner, typically through backups and redundancy.
Together, these three principles form the foundation of information security practices.
Risk refers to the potential for harm or loss to an organization's assets, systems, or data due to vulnerabilities or threats. It is the likelihood that a threat will exploit a vulnerability and cause damage, and the impact of that damage. Risk is typically assessed based on the probability of an event occurring and the potential severity of its consequences.
Risk = Likelihood × Impact
For example, the risk of a data breach might be higher if an organization does not have adequate security measures in place, and the impact could be severe if sensitive data is exposed.
A threat is any potential cause of an incident that could harm or compromise the security of information, systems, or infrastructure. Threats can be intentional (like cyberattacks) or unintentional (like natural disasters or human error). A threat becomes a risk when it can exploit vulnerabilities in a system.
Examples of threats include hackers, malware, social engineering, natural disasters, and even employee negligence.
Security controls are measures implemented to safeguard an organization's information, systems, and assets from risks and threats. These controls can be categorized into Physical, Technical, and Administrative controls, each addressing different aspects of security.
Physical security controls are measures designed to protect the physical infrastructure, facilities, and equipment of an organization. These controls focus on preventing unauthorized access to physical spaces and protecting against physical threats such as theft, vandalism, or natural disasters.
Examples:
Access control systems: Keycards, biometric scanners, or security guards that restrict access to buildings, server rooms, or restricted areas.
Surveillance cameras: CCTV cameras to monitor and record activity in critical areas.
Locks and barriers: Physical locks, gates, fences, or safes to secure valuable assets and prevent unauthorized entry.
Environmental controls: Fire suppression systems, water leak detectors, and temperature controls to protect against environmental hazards.
Procedures : The detailed steps to complete a task that support departmental or organizational policies.
Policies : Put in place by organizational governance, such as executive management, to provide guidance to all activities to ensure that the organization supports industry standards and regulations.
Standards : Often used by governance teams to provide a framework to introduce policies and procedures in support of regulations.
Regulations : Commonly issued in the form of laws, usually from government (not to be confused with governance) and typically carry financial penalties for non-compliance.