The three-pillar approach to cyber security: Data and information protection (2024)

Data and information protection comprise the third and most important pillar of a sound cyber security strategy. It is crucial to consider the ‘CIA triad’ when considering how to protect our data.

The third pillar is data and information protection

This is the third and final article in a series addressing the three-pillar approach to cyber security. The first two pillars are ‘people’ and ‘process’, The last pillar is ‘data and information’.

Data and information protection is the most technical and tangible of the three pillars. The data we gather comes from multiple sources, such as information technology (IT), operational technology (OT), personal data and operational data. It must be properly managed and protected every step of the way.

What is the CIA triad?

When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

The three components of the CIA triad are discussed below:

  1. Confidentiality: This component is often associated with secrecy and the use of encryption. Confidentiality in this context means that the data is only available to authorized parties. When information has been kept confidential it means that it has not been compromised by other parties; confidential data are not disclosed to people who do not require them or who should not have access to them. Ensuring confidentiality means that information is organized in terms of who needs to have access, as well as the sensitivity of the data. A breach of confidentiality may take place through different means, for instance hacking or social engineering.
  2. Integrity: Data integrity refers to the certainty that the data is not tampered with or degraded during or after submission. It is the certainty that the data has not been subject to unauthorized modification, either intentional or unintentional. There are two points during the transmission process during which the integrity could be compromised: during the upload or transmission of data or during the storage of the document in the database or collection.
  3. Availability: This means that the information is available to authorized users when it is needed. For a system to demonstrate availability, it must have properly functioning computing systems, security controls and communication channels. Systems defined as critical (power generation, medical equipment, safety systems) often have extreme requirements related to availability. These systems must be resilient against cyber threats, and have safeguards against power outages, hardware failures and other events that might impact the system availability.

Stability, availability and security

Availability is a major challenge in collaborative environments, as such environments must be stable and continually maintained. Such systems must also allow users to access required information with little waiting time. Redundant systems may be in place to offer a high level of fail-over. The concept of availability can also refer to the usability of a system.

Information security refers to the preservation of integrity and secrecy when information is stored or transmitted. Information security breaches occur when information is accessed by unauthorized individuals or parties. Breaches may be the result of the actions of hackers, intelligence agencies, criminals, competitors, employees or others. In addition, individuals who value and wish to preserve their privacy are interested in information security.

The CIA triad describes three crucial components of data and information protection which can be used as guides for establishing the security policies in an organization. Establishing and maintaining the organization’s security policies can be a daunting task, but using the three-pillared strategic approach to cyber security can help you identify and manage cyber security risks in a methodic and comprehensive manner.

1/23/2020 12:58:05 PM

Contact us

How can we help you?

Contact us
The three-pillar approach to cyber security: Data and information protection (2024)

FAQs

The three-pillar approach to cyber security: Data and information protection? ›

These pillars are: technology, processes, and people. By focusing on these three key areas, organizations can establish a robust cybersecurity framework that mitigates risks and ensures compliance with relevant regulations and standards.

What are the three pillar approach to cyber security? ›

Cyber security can be broken down into three main pillars: people, processes, and technology. If you understand these important components, you can use them as a road map to deliver quality IT service and cybersecurity protection.

What are the three pillars of data security? ›

One framework that serves as a foundation for information security is the CIA Triad, consisting of three pillars: confidentiality, integrity, and availability. Let's delve into each pillar to understand its significance and how they collectively contribute to maintaining a secure environment for data.

What are the three approaches to security in cyber security? ›

This is the third and final article in a series addressing the three-pillar approach to cyber security. The first two pillars are 'people' and 'process', The last pillar is 'data and information'.

What are the three pillars of information protection? ›

Confidentiality, Integrity and Availability, often referred to as the CIA triad (has nothing to do with the Central Intelligence Agency!), are basic but foundational principles to maintaining robust security in a given environment.

What are the three 3 principles of cyber security? ›

What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What is the three pillar model? ›

Although the Three Pillar model (strategy, law, ethics) can be applied within all organizations (public or private, business or nonprofit) and also when making personal decisions as simple as ordering a pizza, this book focuses on using the model to make business decisions.

What are 3 pillars of application security? ›

In order to protect your organization's applications from attack, it is essential to have a strong foundation in the three pillars of application security: process, technology, and people. Each pillar plays an equally important role in ensuring the security of your applications.

What are the three 3 primary concepts in information security? ›

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.

What are the three 3 aspects of security? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.

What are the 3 P's of cyber security? ›

Using the common PPP Framework (People-Process-Product), Systal's Principal Architect Tim Watson explores the importance of maintaining equal focus on all three Ps in IT security. It's a well-known saying: “Two's company, three's a crowd”.

What is 3 as in cyber security? ›

The 3 A's of cybersecurity, Authentication, Authorization, and Access Control, form the foundational trio that ensures a robust and secure system. These three elements work together to establish and maintain the integrity and confidentiality of data.

What are the 3 standard pillars of cyber security? ›

It is a framework that enables companies to manage their digital systems and infrastructure better and safeguard their data. Cyber Security depends on three key pillars - Process, Technology, and People. These three combine and work together to secure the company's data effectively.

What are the three major types of cyber security? ›

This starts with preventing unauthorized access, which could be part of coordinated cyber attacks and other digital threats against a company. The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security.

What are the 3 main protection goals in information security? ›

The three most important protection goals of information security are "confidentiality", "integrity" and "availability".

What are the 3 elements of good cyber security? ›

In conclusion, understanding the 3 elements of cyber security is imperative for any organization. The trio of Identification, Protection, and Response form the crux of an effective cybersecurity system. Each element has a distinct role to play and is crucial in safeguarding an organization's digital assets.

What are the 3 C's of cyber security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What are the three concepts of cyber security? ›

The foundation of cyber security basics lies in the CIA triad, which stands for confidentiality, integrity and availability. These three concepts of cyber security form the basis of protecting sensitive information and ensuring digital systems can operate securely.

Top Articles
Credit Card Cloning: Definition and Ways to Protect Yourself
12 Ways to Make Up an Excuse to Get Off the Phone - wikiHow
Antisis City/Antisis City Gym
Bank Of America Financial Center Irvington Photos
Duralast Gold Cv Axle
Faridpur Govt. Girls' High School, Faridpur Test Examination—2023; English : Paper II
Z-Track Injection | Definition and Patient Education
Wannaseemypixels
America Cuevas Desnuda
Santa Clara College Confidential
How Much Is 10000 Nickels
Craigslist In South Carolina - Craigslist Near You
King Fields Mortuary
Ncaaf Reference
Detroit Lions 50 50
Jasmine Put A Ring On It Age
I Touch and Day Spa II
Roof Top Snipers Unblocked
Richland Ecampus
Sussur Bloom locations and uses in Baldur's Gate 3
Rs3 Eldritch Crossbow
Jayah And Kimora Phone Number
Obituaries Milwaukee Journal Sentinel
Hannaford Weekly Flyer Manchester Nh
Powerschool Mcvsd
Finding Safety Data Sheets
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Dhs Clio Rd Flint Mi Phone Number
John Deere 44 Snowblower Parts Manual
30+ useful Dutch apps for new expats in the Netherlands
Skepticalpickle Leak
Ups Drop Off Newton Ks
Wells Fargo Bank Florida Locations
Halsted Bus Tracker
1400 Kg To Lb
Cvb Location Code Lookup
Domino's Delivery Pizza
Avance Primary Care Morrisville
Space Marine 2 Error Code 4: Connection Lost [Solved]
How are you feeling? Vocabulary & expressions to answer this common question!
How Many Dogs Can You Have in Idaho | GetJerry.com
Bekah Birdsall Measurements
boston furniture "patio" - craigslist
Levi Ackerman Tattoo Ideas
Valls family wants to build a hotel near Versailles Restaurant
Paradise leaked: An analysis of offshore data leaks
House For Sale On Trulia
Latina Webcam Lesbian
Greg Steube Height
Walmart Front Door Wreaths
ats: MODIFIED PETERBILT 389 [1.31.X] v update auf 1.48 Trucks Mod für American Truck Simulator
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6526

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.