Skip to main content

Availability,Intergrity,Confidentiality

Confidentiality,Integrity,Availability is Commonly Known as CIA in computer security.It`s Like the Heart of Computer Security.


Confidentiality :-  Briefly call as an assurance or protection of a certain data.

Integrity :-  provide high accurate data by preventing data modifying by unauthorized parties, for the user.

Availability :- It means always accessible or always ready for service.

These three Elements are well bounded with each other.for a example if there is no availability at all times in a certain web server we call it as a security problem.

for those Confidentiality,Integrity,Availability we can categorize them as High,Moderate and Low.

High :- The computer Security problem affects a major damage to a particular organization such as lose of life or serious life threatening or a major financial lost or collapsing.

Moderate :- The computer security problem affects a damage to a particular organization but no lose of life or serious life threatening but the could be a financial lost or prevent from functioning.

Low :- The computer security problem could affect a less damage or miner damage to the organization`s assets.

Here are Some Examples for those Confidentiality,Integrity,Availability with categorizing into High,Moderate and Low.

Confidentiality :-  Online Banking data is a high confidential data service.because if those data accessed by unauthorized third party there will be a big lose or a big unauthorized gain for a particular party.
                              National Security data also high confidential data if a terrorists organization could access to those data there will be a huge risk to the civilization of that particular country.
                             law enforcement (the identities of undercover drug agents) is a high confidential data because if those date exposed to public those agents will fall in to serious life risks.

                             Student Enrollment data is moderate confidential data because it`s less targetable information.

                             Directory information, such as lists of students or faculty or departmental lists are examples for low confidential data.these information wide openly available on internet or printed directory information.

Integrity :-  Hospital`s patient allergy information is high integrity matter,because if somehow someone changes a particular patient`s data then the doctor will treat that particular patient with wrong and it may put patients life in danger.
                 
                     News Papers/T.V News are moderate integrity matter because nowadays the accuracy of news are not good enough as an example same news in different channels is different.
                 
                     Gossips sites are low integrity matter because most of informations in gossip sites are false.

Availability :- A system that provides authentication is a high availability requirement because if client couldn`t access to the service so the organization may cause financial problem.

                        A public website for a university is a moderate availability requirement because of annoying to get access in university premisces.

                        An online Telephone Directory lookup is a low availability requirement because there are alternative sources.

in conclusion if there is a computer security problem occurs mostly the reason should be one or more failure in those Availability,Integrity,Confidentiality in High,Moderate or Low level.


Comments

Popular posts from this blog

Challenges in Computer Security

Challenges in Computer Security Nowadays Computers are life partners in daily human life.your smart watch,your smart phone,your tablet pc,your laptop.best example is while your in a power cut,when your smart devices batteries dead you may remember how inconvenient  you felt. likewise when you use more and more computers you start to use internet too,then you share your privacy such as your bank account details,your google account or it could be your facebook profile. with those services or devices.so the perpendiculars know that.if they could access those devices and services they can do whatever they want with your information.there is a huge risk containing with this issue sometimes it even cause to loose of life or serious life threatening.so nowadays everyone needs a security protocol for there computers and also internet services. Investing on Cybersecurity As you can see above world`s Investing for Cybersecurity increases day by day because of gaining risks in ...

The Boring Company

Have you ever bored? Yes, Right? But have you ever heard about a Boring Company? Probably No. But there is a company named "The Boring Company". Wired Right? But The Boring Company is following a new strategy in transportation. Most of you may be thinking that the new era of transportation is flying cars. But it is still under testing. But have you ever thought about underground tunnel transportation? It is happening now. The boring company is building an underground tunnel system for public transportation in The NewYork city and they call it "The Loop". "Loop is a high-speed underground public transportation system in which passengers are transported on autonomous electric skates traveling at 125-150 miles per hour. Electric skates will carry between 8 and 16 passengers, or a single passenger vehicle." - The Boring Company According to The Google Maps, this 38.2 miles trip takes around 1 hour and 52 minutes at the worst case.But using The Loop it ...

Meltdown and Spectre attacks ගැන සිoහලෙන්.

හායි,ගොඩාක් කාලෙකට පස්සෙ මම ආපහු blog එකට ලියන්න හිතුවා.ඉතින් අද මම කියන්න යන්නේ ඔයගොල්ලො හැමොම  දැනගන්න ඕනි වැදගත් කාරනයක් ගැන.ඉතින් වැඩියෙ කියන්න දෙයක් නෑනේ ලoකාවෙ  ගොඩාක් අය දැන් computers පාවිචි කරනවානේ ඉතින් දැනුවත්ව හරි නොදැනුවත්ව හරි ඔයගොල්ලෝ හැමෝම මේ අවදානමට ලක් වෙලා ඉන්නවා. ඉතින් මේ ප්‍රශ්නෙ තියෙන්නේ ඔයාලටවත් මටවත් අතගහන්න පුලුවන් ලේසි තැනක නෙමෙයි.මේ ප්‍රශ්නෙ තියෙන්නේ ඔයාලගේ Desktop හරි Laptop හරි Tablet එකේ හරි  phone එකේ හරි තමයි.කොටින්ම කියනවනම් ඔයලාගෙ Device එකේ Processor තමයි ලෙඩේ තියෙන්නේ. Meltdown සහ Spectre කියන මේ vulnerability දෙක ගැන ලෝකෙට අනාවරනය උනේ පහුගිය ජනවරි 3 වෙනිදා එදා ඉදලා ලෝකේ ඉන්න හැම Desktop, Laptop, Tablet, Smartphone නිශ්පාදකයෝ වගේම Operating System නිශ්පදකයොත් හනි හනිකට මේ ප්‍රශ්න වලට විසදුම් හොයන්න උත්සහ කරමින් ඉන්නවා.කොටින්ම කියනවානම් අපි ඔකෝම දන්න Apple iPhone පවා මේ ප්‍රශ්නෙට මූන දීලා ඉන්නවා. දැනට මේ ප්ර්ශ්නෙට තාවකලික විසදුමක් විදිහට Microsoft සමාගමෙන් Windows පරිගනක මෙහෙයුම් පද්ධති සදහා Update patch එකක් release කර...