CIA triad
CIA Triad Challenges
- Big data - IoT privacy and security
Integrity
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle . Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people These measures include file permissions and user access controls.
CIA Triad
Model designed to guide policies for information security within an organization. The elements of the triad (Confidentiality, Integrity and Availability) are considered the three most crucial components of security.
Availability
Security actions that ensure that data is accessible to authorized users.
Confidentiality
Think about privacy. Measures taken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Access must be restricted to those authorized to view the data in question.