Introduction To Cyber Security, CIA Triad
Introduction To Cyber Security, CIA Triad
CYBER SECURITY
INTRODUCTION
Computer Security 2
Vulnerability
• Weakness in a system for example, in procedures, design, or
implementation, that might be exploited to cause loss or harm.
Threat
• Set of circumstances that has the potential to cause loss or harm.
An analogy to differentiate threat and
vulnerability 4
5
• Control
• An action, device, procedure, or technique that removes or reduces
a vulnerability
• Confidentiality:
the ability of a system to ensure that an asset is viewed
only by authorized parties
• Integrity:
the ability of a system to ensure that an asset is modified
only by authorized parties
• Availability:
the ability of a system to ensure that an asset can be
used by any authorized parties
7
• Confidentiality
The definition of confidentiality is straightforward: Only
authorized people or systems can access protected data.
• Confidentiality relates most obviously to data, although we
can think of the confidentiality of a piece of hardware (a
novel invention) or a person (the whereabouts of a wanted
criminal).
10
• properties that could mean a failure of data confidentiality:
o An unauthorized person accesses a data item.
o An unauthorized process or program accesses a data item.
o A person authorized to access certain data accesses,other data not
authorized (which is a specialized version of “an unauthorized person
accesses a data item”).
o An unauthorized person accesses an approximate data value (for example,
not knowing someone’s exact salary but knowing that the salary falls in a
particular range or exceeds a particular amount).
o An unauthorized person learns the existence of a piece of data (for
example, knowing that a company is developing a certain new product or
that talks are underway about the merger of two companies).
11
12