Cybersecurity: Part of the Development Process
Security is an important part of the development process and security considerations should be taken into account during the process, not after it is completed.
CIA Triad: Confidentiality
In Cybersecurity, Confidentiality is the pillar of the CIA triad which refers to the principle that only those who should have access to information can access it.
CIA Triad: Integrity
In Cybersecurity, Integrity is the pillar of the CIA triad which refers to the principle that data is what we expect it to be.
In other words, data should not be able to be edited by unauthorized parties.
CIA Triad: Availability
In Cybersecurity, Availability is the pillar of the CIA triad which refers to the principle that data is reliably available.
Security Principle: CIA Triad
One of the most important security principles is the CIA triad, which stands for Confidentiality, Availability, and Integrity.
Incident Response
In Cybersecurity, incident response is defined as everything that needs to happen to investigate and recover from an incident.
Cybersecurity Incidents
In Cybersecurity, an incident is defined as a any event that puts the confidentiality, integrity, availability or other security policies of a system at risk.
Data Loss
Data loss is when data becomes temporarily or permanently unavailable.
Data Breach
A data breach is when data is intentionally or accidentally accessed by an unauthorized party.
This is an example of a violation of the Confidentiality pillar in the CIA Triad.
Data Exfiltration
Data exfiltration is the intentional, unauthorized transfer of data to an external party.
This is an example of a violation of the Confidentiality pillar in the CIA Triad.
Vulnerability Impacts
Cybersecurity vulnerabilities can potentially result in data loss, identity theft, and financial and reputational damage.