0% found this document useful (0 votes)
19 views9 pages

Ias Sep 2022

The key objectives of the CIA Triad in network security are confidentiality, integrity, and availability. This ensures the protection of information within a network. It involves implementing encryption, access controls, and integrity checks to mitigate disruptions. A well-balanced approach addressing all three objectives is essential for creating a robust and secure network environment.

Uploaded by

gr2dgjjhnf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

Ias Sep 2022

The key objectives of the CIA Triad in network security are confidentiality, integrity, and availability. This ensures the protection of information within a network. It involves implementing encryption, access controls, and integrity checks to mitigate disruptions. A well-balanced approach addressing all three objectives is essential for creating a robust and secure network environment.

Uploaded by

gr2dgjjhnf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

- - -

- scope purpose
-

managemenis

gratio -
CIA Triad which stands for
confidentiality Integrity Availability represent >3 core
-

objectives of information security-


The key objectives of the CIA Tried
-
in the context of network security are to sure the <i,e of information
within
-
a network
- Involves implementing checks and so on to mitigate disruptions.
a combination of encryption , access controls , integrity
objectives is essential for creating
addresses all a robust a secure
-
A well-balanced approach that 3
network environment.

- -

the formula emphasizes the interconnected nature of risk components .


assess riska determine needs
~ -

strategies -
include
a
- total stakeholder perspectives
I

cont
-nitor
tough Home s
factor
=

a) -
Through former employees
-former employees working for competitors
former employees retaining company data
-

former employees discussing company matters

↳ Through software
-

insufficient testing
-
rack of audit trail
-
software bugs & design faults
-

unchecked user input


↳ Through hardware
-

susceptibility to dest
heat a humidity
-hardware design flaws
-out of date hardware
-

misconfiguration of hardware
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
ABCDEFGHIJKLMNOPQRSTUVWXYZ
TUVWXYZABCDEFGHIJKLMNOPQRS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy