Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Class notes TOFEL

Rating
-
Sold
-
Pages
3
Uploaded on
15-06-2025
Written in
2024/2025

well for case in network cyber

Institution
Course

Content preview

The CIA Triad is a fundamental concept in information security that stands for:
1. Confidentiality
2. Integrity
3. Availability

Each component of the CIA Triad addresses a different aspect of securing
information and systems.

1. Confidentiality
Confidentiality ensures that sensitive information is accessed only by authorized
individuals and entities. The goal is to prevent unauthorized access to data and
protect privacy. Techniques to maintain confidentiality include:

Encryption: Transforming readable data into an unreadable format that can only be
decrypted by those who possess the appropriate key.
Access Control: Implementing measures such as passwords, authentication, and
authorization to restrict access to sensitive information.
Data Masking: Obscuring specific data within a database to prevent unauthorized
access.
2. Integrity
Integrity ensures that information is accurate, reliable, and unaltered by
unauthorized parties. The goal is to protect data from being tampered with or
altered, ensuring it remains consistent and trustworthy. Techniques to ensure
integrity include:

Hashing: Generating a unique hash value from data to detect any changes. If the
data is altered, the hash value will change, indicating a potential integrity
issue.
Checksums: Calculating a checksum value for data, which can be used to verify the
integrity of the data during transmission or storage.
Digital Signatures: Using cryptographic techniques to verify the authenticity and
integrity of digital messages or documents.
3. Availability
Availability ensures that information and resources are accessible to authorized
users whenever they are needed. The goal is to ensure that systems and data are
available and functional at all times. Techniques to maintain availability include:

Redundancy: Implementing redundant systems and resources to provide backup in case
of a failure.
Load Balancing: Distributing workloads across multiple systems to prevent any
single system from becoming overwhelmed.
Disaster Recovery Plans: Developing plans and procedures to recover data and
systems in the event of a disaster or major failure.
Example Scenarios
Confidentiality: A company encrypts its customer database to ensure that even if
the database is stolen, the data remains unreadable to unauthorized parties.

Integrity: An e-commerce website uses digital signatures to verify that the
transaction details have not been altered during transmission from the customer to
the payment processor.

Availability: A cloud service provider employs multiple data centers in different
geographical locations to ensure that services remain available even if one data
center experiences an outage.

Substitution:
ROT13 cipher refers to the abbreviated form Rotate by 13 places. It is a special
case of Caesar Cipher in which shift is always 13. Every letter is shifted by 13
places to encrypt or decrypt the message.

Written for

Course

Document information

Uploaded on
June 15, 2025
Number of pages
3
Written in
2024/2025
Type
Class notes
Professor(s)
Vishuva
Contains
All classes

Subjects

$23.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
mithraqueen

Get to know the seller

Seller avatar
mithraqueen stuvia
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
10 months
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions