Network CIA Triad
Network CIA Triad
Learning Journal
Confidentiality, integrity and availability are key teachings in the network session, commonly
referred to as the C.I.A Triangle. These considerations ensure that the information is protected
from unauthorized access, alteration and destruction, therefore maintaining reliable and
trustworthy data and systems.
Confidentiality: they protect the information from an unworthy introduction and an
expression. This suggests that the important information is easy for the authorities.
Various mechanisms are used to manage privacy, Agnos, accidents, certification
processes, etc. For example, in the corporate environment, the customer’s data should be
accessible only to those who need to do the business.
Integrity: it ensures that the information is accurate and reliable. This includes safeguards
against alterations by unauthorized persons. Authentication measures include checksums,
hashing algorithms, and digital signatures to detect any changes to the data. Ensuring
integrity is essential to maintaining the integrity of the information, which is critical for
the decision-making process and building user trust.
Availability: ensures that information and resources are accessible to authorized users
when needed. This means that systems and data must work reliably, without interruption.
Measures to ensure availability include redundant configuration, routine maintenance,
and robust network infrastructure designed to withstand attacks such as distributed denial
of service (DDoS).
While all three parts of the CIA triangle are important, the most considered in web design is
often based on the specific situation and organizational needs but in many cases, what is
available is considered the most important. Without it, even the most confidential and sensitive
data is useless if it is not accessed when necessary. In healthcare settings, for example, access to
patient data for physicians can be a matter of life and death. Similarly, when e-commerce
platforms go out of business, it can result in significant revenue losses and reputational damage.
Additionally, a missing policy can compromise privacy and integrity policies. Without the
website, users may not be able to access their tasks, which could lead to downtime and
negatively affect business continuity. Thus, ensuring scalability through robust communication
infrastructure that includes redundancy, failure mechanisms and comprehensive disaster recovery
plans is often key.
In conclusion, although confidentiality and integrity are important components of network
security, availability is often the most important consideration in network design and without it,
and the CIA triangle cannot be taken of other components are underutilized, making it the
cornerstone of a reliable and secure network infrastructure.
Reference:
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.).
Pearson.
Whitman, M. E., & Mattord, H. J. (2009). Principles of information security (p. 656). Boston,
MA: Thomson Course Technology.