The three-pillar approach to cyber security: Data and information protection (2024)

Data and information protection comprise the third and most important pillar of a sound cyber security strategy. It is crucial to consider the ‘CIA triad’ when considering how to protect our data.

The third pillar is data and information protection

This is the third and final article in a series addressing the three-pillar approach to cyber security. The first two pillars are ‘people’ and ‘process’, The last pillar is ‘data and information’.

Data and information protection is the most technical and tangible of the three pillars. The data we gather comes from multiple sources, such as information technology (IT), operational technology (OT), personal data and operational data. It must be properly managed and protected every step of the way.

What is the CIA triad?

When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

The three components of the CIA triad are discussed below:

  1. Confidentiality: This component is often associated with secrecy and the use of encryption. Confidentiality in this context means that the data is only available to authorized parties. When information has been kept confidential it means that it has not been compromised by other parties; confidential data are not disclosed to people who do not require them or who should not have access to them. Ensuring confidentiality means that information is organized in terms of who needs to have access, as well as the sensitivity of the data. A breach of confidentiality may take place through different means, for instance hacking or social engineering.
  2. Integrity: Data integrity refers to the certainty that the data is not tampered with or degraded during or after submission. It is the certainty that the data has not been subject to unauthorized modification, either intentional or unintentional. There are two points during the transmission process during which the integrity could be compromised: during the upload or transmission of data or during the storage of the document in the database or collection.
  3. Availability: This means that the information is available to authorized users when it is needed. For a system to demonstrate availability, it must have properly functioning computing systems, security controls and communication channels. Systems defined as critical (power generation, medical equipment, safety systems) often have extreme requirements related to availability. These systems must be resilient against cyber threats, and have safeguards against power outages, hardware failures and other events that might impact the system availability.

Stability, availability and security

Availability is a major challenge in collaborative environments, as such environments must be stable and continually maintained. Such systems must also allow users to access required information with little waiting time. Redundant systems may be in place to offer a high level of fail-over. The concept of availability can also refer to the usability of a system.

Information security refers to the preservation of integrity and secrecy when information is stored or transmitted. Information security breaches occur when information is accessed by unauthorized individuals or parties. Breaches may be the result of the actions of hackers, intelligence agencies, criminals, competitors, employees or others. In addition, individuals who value and wish to preserve their privacy are interested in information security.

The CIA triad describes three crucial components of data and information protection which can be used as guides for establishing the security policies in an organization. Establishing and maintaining the organization’s security policies can be a daunting task, but using the three-pillared strategic approach to cyber security can help you identify and manage cyber security risks in a methodic and comprehensive manner.

1/23/2020 12:58:05 PM

Contact us

How can we help you?

Contact us
The three-pillar approach to cyber security: Data and information protection (2024)

FAQs

The three-pillar approach to cyber security: Data and information protection? ›

These pillars are: technology, processes, and people. By focusing on these three key areas, organizations can establish a robust cybersecurity framework that mitigates risks and ensures compliance with relevant regulations and standards.

What are the three pillar approach to cyber security? ›

Cyber security can be broken down into three main pillars: people, processes, and technology. If you understand these important components, you can use them as a road map to deliver quality IT service and cybersecurity protection.

What are the three pillars of data security? ›

One framework that serves as a foundation for information security is the CIA Triad, consisting of three pillars: confidentiality, integrity, and availability. Let's delve into each pillar to understand its significance and how they collectively contribute to maintaining a secure environment for data.

What are the three approaches to security in cyber security? ›

This is the third and final article in a series addressing the three-pillar approach to cyber security. The first two pillars are 'people' and 'process', The last pillar is 'data and information'.

What are the three pillars of information protection? ›

Confidentiality, Integrity and Availability, often referred to as the CIA triad (has nothing to do with the Central Intelligence Agency!), are basic but foundational principles to maintaining robust security in a given environment.

What are the three 3 principles of cyber security? ›

What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What is the three pillar model? ›

Although the Three Pillar model (strategy, law, ethics) can be applied within all organizations (public or private, business or nonprofit) and also when making personal decisions as simple as ordering a pizza, this book focuses on using the model to make business decisions.

What are 3 pillars of application security? ›

In order to protect your organization's applications from attack, it is essential to have a strong foundation in the three pillars of application security: process, technology, and people. Each pillar plays an equally important role in ensuring the security of your applications.

What are the three 3 primary concepts in information security? ›

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.

What are the three 3 aspects of security? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.

What are the 3 P's of cyber security? ›

Using the common PPP Framework (People-Process-Product), Systal's Principal Architect Tim Watson explores the importance of maintaining equal focus on all three Ps in IT security. It's a well-known saying: “Two's company, three's a crowd”.

What is 3 as in cyber security? ›

The 3 A's of cybersecurity, Authentication, Authorization, and Access Control, form the foundational trio that ensures a robust and secure system. These three elements work together to establish and maintain the integrity and confidentiality of data.

What are the 3 standard pillars of cyber security? ›

It is a framework that enables companies to manage their digital systems and infrastructure better and safeguard their data. Cyber Security depends on three key pillars - Process, Technology, and People. These three combine and work together to secure the company's data effectively.

What are the three major types of cyber security? ›

This starts with preventing unauthorized access, which could be part of coordinated cyber attacks and other digital threats against a company. The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security.

What are the 3 main protection goals in information security? ›

The three most important protection goals of information security are "confidentiality", "integrity" and "availability".

What are the 3 elements of good cyber security? ›

In conclusion, understanding the 3 elements of cyber security is imperative for any organization. The trio of Identification, Protection, and Response form the crux of an effective cybersecurity system. Each element has a distinct role to play and is crucial in safeguarding an organization's digital assets.

What are the 3 C's of cyber security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What are the three concepts of cyber security? ›

The foundation of cyber security basics lies in the CIA triad, which stands for confidentiality, integrity and availability. These three concepts of cyber security form the basis of protecting sensitive information and ensuring digital systems can operate securely.

Top Articles
2024 Emoji Meanings: An Emoji Dictionary for Parents
🇭🇷 Flag: Croatia Emoji, HR Flag Emoji, Croatian Flag Emoji
Minooka Channahon Patch
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Tabc On The Fly Final Exam Answers
Doublelist Paducah Ky
Tyrunt
Nordstrom Rack Glendale Photos
Jefferson County Ky Pva
T&G Pallet Liquidation
Graveguard Set Bloodborne
Ucf Event Calendar
414-290-5379
Sitcoms Online Message Board
Simple Steamed Purple Sweet Potatoes
Spelunking The Den Wow
Detroit Lions 50 50
How Many Cc's Is A 96 Cubic Inch Engine
Flights To Frankfort Kentucky
2021 Lexus IS for sale - Richardson, TX - craigslist
Studentvue Columbia Heights
Osborn-Checkliste: Ideen finden mit System
Unionjobsclearinghouse
Craigslist St. Cloud Minnesota
8005607994
Yonkers Results For Tonight
E32 Ultipro Desktop Version
Walgreens Bunce Rd
Drift Hunters - Play Unblocked Game Online
Sam's Club Gas Price Hilliard
N.J. Hogenkamp Sons Funeral Home | Saint Henry, Ohio
Rock Salt Font Free by Sideshow » Font Squirrel
Kattis-Solutions
Fox And Friends Mega Morning Deals July 2022
Kips Sunshine Kwik Lube
Leatherwall Ll Classifieds
“Los nuevos desafíos socioculturales” Identidad, Educación, Mujeres Científicas, Política y Sustentabilidad
The Angel Next Door Spoils Me Rotten Gogoanime
Post A Bid Monticello Mn
Ghareeb Nawaz Texas Menu
Citymd West 146Th Urgent Care - Nyc Photos
✨ Flysheet for Alpha Wall Tent, Guy Ropes, D-Ring, Metal Runner & Stakes Included for Hunting, Family Camping & Outdoor Activities (12'x14', PE) — 🛍️ The Retail Market
The Great Brian Last
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
Fine Taladorian Cheese Platter
Who uses the Fandom Wiki anymore?
Ubg98.Github.io Unblocked
Metra Union Pacific West Schedule
Factorio Green Circuit Setup
Ravenna Greataxe
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6526

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.