Which of the following provides the best protection against the loss of confidentiality for sensitive data?

04 Aug Confidentiality, Integrity and Availability – The CIA Triad

The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security.  Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.

Nội dung chính

  • 04 Aug Confidentiality, Integrity and Availability – The CIA Triad
  • What is the best way to protect sensitive data?
  • How do you protect the confidentiality of data?
  • What is the most reliable way to ensure the confidentiality of a sensitive message?
  • What protects the security of sensitive information for a network?

Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access.  Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct. Availability means that authorized users have access to the systems and the resources they need.

If you are preparing for the CISSP, Security+, CySA+, or another security certification exam, you will need to have an understanding of the importance of the CIA Triad, the definitions of each of the three elements, and how security controls address the elements to protect information systems.

Confidentiality

Confidentiality measures protect information from unauthorized access and misuse.  Most information systems house information that has some degree of sensitivity. It might be proprietary business information that competitors could use to their advantage, or personal information regarding an organization’s employees, customers or clients.

Confidential information often has value and systems are therefore under frequent attack as criminals hunt for vulnerabilities to exploit.  Threat vectors include direct attacks such as stealing passwords and capturing network traffic, and more layered attacks such as social engineering and phishing.  Not all confidentiality breaches are intentional. A few types of common accidental breaches include emailing sensitive information to the wrong recipient, publishing private data to public web servers, and leaving confidential information displayed on an unattended computer monitor.

Healthcare is an example of an industry where the obligation to protect client information is very high.  Not only do patients expect and demand that healthcare providers protect their privacy, there are strict regulations governing how healthcare organizations manage security.  The Health Insurance Portability and Accountability Act (HIPAA) addresses security, including privacy protection, in the the handling of personal health information by insurers, providers and claims processors.  HIPAA rules mandate administrative, physical and technical safeguards, and require organizations to conduct risk analysis.

There are many countermeasures that organizations put in place to ensure confidentiality.  Passwords, access control lists and authentication procedures use software to control access to resources.  These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit.  Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as physical controls that prevent people from accessing facilities and equipment.

Integrity

Integrity measures protect information from unauthorized alteration.  These measures provide assurance in the accuracy and completeness of data.  The need to protect information includes both data that is stored on systems and data that is transmitted between systems such as email.  In maintaining integrity, it is not only necessary to control access at the system level, but to further ensure that system users are only able to alter information that they are legitimately authorized to alter.

As with confidentiality protection, the protection of data integrity extends beyond intentional breaches.  Effective integrity countermeasures must also protect against unintentional alteration, such as user errors or data loss that is a result of a system malfunction.

While all system owners require confidence in the integrity of their data, the finance industry has a particularly pointed need to ensure that transactions across its systems are secure from tampering.  One of the most notorious financial data integrity breaches in recent times occurred in February 2016 when cyber thieves generated $1-billion in fraudulent withdrawals from the account of the central bank of Bangladesh at the Federal Reserve Bank of New York.  The hackers executed an elaborate scheme that included obtaining the necessary credentials to initiate the withdrawals, along with infecting the banking system with malware that deleted the database records of the transfers and then suppressed the confirmation messages which would have alerted banking authorities to the fraud.  After the scheme was discovered most of the transfers were either blocked or the funds recovered, but the thieves were still able to make off with more than $60-million.

There are many countermeasures that can be put in place to protect integrity.  Access control and rigorous authentication can help prevent authorized users from making unauthorized changes.  Hash verifications and digital signatures can help ensure that transactions are authentic and that files have not been modified or corrupted.  Equally important to protecting data integrity are administrative controls such as separation of duties and training.

Availability

In order for an information system to be useful it must be available to authorized users.  Availability measures protect timely and uninterrupted access to the system. Some of the most fundamental threats to availability are non-malicious in nature and include hardware failures, unscheduled software downtime and network bandwidth issues.  Malicious attacks include various forms of sabotage intended to cause harm to an organization by denying users access to the information system.

The availability and responsiveness of a website is a high priority for many business.  Disruption of website availability for even a short time can lead to loss of revenue, customer dissatisfaction and reputation damage.  The Denial of Service (DoS) attack is a method frequently used by hackers to disrupt web service. In a DoS attack, hackers flood a server with superfluous requests, overwhelming the server and degrading service for legitimate users.  Over the years, service providers have developed sophisticated countermeasures for detecting and protecting against DoS attacks, but hackers also continue to gain in sophistication and such attacks remain an ongoing concern.

Availability countermeasures to protect system availability are as far ranging as the threats to availability.  Systems that have a high requirement for continuous uptime should have significant hardware redundancy with backup servers and data storage immediately available.  For large, enterprise systems it is common to have redundant systems in separate physical locations. Software tools should be in place to monitor system performance and network traffic.  Countermeasures to protect against DoS attacks include firewalls and routers.

Understanding the CIA Triad is an important component of your preparation for a variety of security certification programs.  If you’re interested in earning your next security certification, sign up for the free CertMike study groups for the CISSP, Security+, SSCP, or CySA+ exam.

How can I protect Sensitive Data? Encryption is the most effective way to protect your data from unauthorized access. Encryption can be defined as transforming the data into an alternative format that can only be read by a person with access to a decryption key.

A good example of methods used to ensure confidentiality is an account number or routing number when banking online. Data encryption is a common method of ensuring confidentiality.

Network Security Controls: All transmission of Sensitive Information via the Internet must be through a properly secured connection point to ensure the network is protected. Such systems must be protected by a host or network firewall and comply with PPM 10-3 Network Security / Firewall Policy.

How can data confidentiality be protected?

When managing data confidentiality, follow these guidelines:.
Encrypt sensitive files. ... .
Manage data access. ... .
Physically secure devices and paper documents. ... .
Securely dispose of data, devices, and paper records. ... .
Manage data acquisition. ... .
Manage data utilization. ... .
Manage devices..

What is sensitive data in information security?

Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.

Which of the following is a type of sensitive information?

Personal Information Protected health information (PHI) such as medical records, laboratory tests, and insurance information. Educational information such as enrollment records and transcripts. Financial information such as credit card numbers, banking information, tax forms, and credit reports.

How do you store confidential data?

7 tips for storing confidential data.
Enable full disk encryption on all devices. ... .
Restrict confidential data to the office. ... .
Don't transfer unencrypted data over the Internet. ... .
Delete sensitive data you no longer need. ... .
Encrypt backups. ... .
Store more than one copy. ... .
Secure archive and cryptocontainer passwords..