Cyber Security Goal

Advertisements

Cyber Security Tutorial Cyber Security Tutorial

What are Cyber Security Goal

The main goal of cyber security are, To protect the confidentiality of data, To preserve the integrity of data and To promote the availability of data for authorized users.

The primary goal of cyber security is to defend networks and systems against malicious modification and leakage of information.

Goal of Cyber Security

  • To protect the confidentiality of data
  • To preserve the integrity of data
  • To promote the availability of data for authorized users

Or in short - ensuring the confidentiality, integrity, immutability, availability, and dependability in connected systems. Systems can be end-points or embedded.

These goals create the popular cyber Security triad of confidentiality, integrity and availability. It is also known as the CIA or is known as the AIC model (as the CIA is sometimes confused with the Central Intelligence Agency). Together they form the three most crucial components of security. Let us revisit these in detail.

Confidentiality

It is equivalent to privacy and prevents unauthorized access to information. It involves protection of data by disallowing harmful agents by learning anything about its content. Data encryption is the most common way to ensure confidentiality. Tools utilized to put this into effect are encryption, access control, authentication, authorization, physical security, etc.

Integrity

Integrity refers to the methods that are utilized to ensure that data is real, accurate and safeguarded from unauthorized modification by any user. It is the property that information is not be altered in an unauthorized way, and that source of the information is genuine. Tools utilized to ensure the practice of integrity into cyber Security backups, checksum, data correcting codes, availability.

Availability

Availability is the property in which information is accessible and modifiable in a timely fashion by those authorized to do so. It is the guarantee of reliable and constant access to sensitive data by authorized people. The tools that are used to employ the practice of availability are physical protection and computer redundancies.


Cyber Security Tutorial Cyber Security Tutorial

Google Advertisment

Buy This Ad Space @$20 per Month, Ad Size 600X200 Contact on: hitesh.xc@gmail.com or 9999595223

Magenet is best Adsense Alternative here we earn $2 for single link, Here we get links ads. Magenet

For Projects 9999595223

Google Advertisements


Buy Websites 9999595223

Buy College Projects with Documentation Contact on whatsapp 9999595223. Contact on: hitesh.xc@gmail.com or 9999595223 Try this Keyword C++ Programs

Advertisements