CIA Triad

Neso Academy
29 Mar 202116:08

Summary

TLDRThis lecture delves into the fundamental aspects of computer security, focusing on the CIA triad which stands for Confidentiality, Integrity, and Availability. The speaker explains that computer security aims to protect information systems, including hardware, software, firmware, data, and telecommunications, against unauthorized access and breaches. The CIA triad ensures that data remains confidential, unaltered in integrity, and accessible when needed. The lecture also touches on the importance of additional elements like Authenticity and Accountability, which are crucial for verifying the trustworthiness of information sources and maintaining a record of user activities for forensic analysis. The impact of security breaches is categorized into low, medium, and high levels, with each level representing increasing severity of consequences. Real-world examples, such as banking transactions and healthcare systems, illustrate the practical applications of the CIA triad in safeguarding sensitive information and ensuring reliable access to services.

Takeaways

  • 🔒 The definition of computer security by NIST emphasizes the protection of information systems to preserve integrity, availability, and confidentiality of resources.
  • 📈 The CIA triad is a fundamental concept in computer security, consisting of Confidentiality, Integrity, and Availability as its three key elements.
  • 🔐 Confidentiality ensures that information is accessible only to authorized entities, preventing unauthorized access and disclosure.
  • đŸ›Ąïž Integrity ensures that data remains unaltered during transmission, preventing unauthorized modifications that could lead to incorrect or harmful outcomes.
  • 🚀 Availability ensures that systems and services are accessible and functioning as expected, even in the face of potential attacks or disruptions.
  • 📉 The impact of a security breach can be categorized into low, medium, and high levels, with each level indicating the severity and potential consequences of the breach.
  • 🔑 Authenticity and Accountability are additional elements to the CIA triad, focusing on verifying the identity of parties involved and ensuring responsibility for actions taken within a system.
  • 🏩 An example of confidentiality is banking account information, which should be encrypted to prevent unauthorized viewing or interception.
  • đŸ„ An example of integrity is patient information in a hospital management system, where the accuracy of sensor data is critical for proper medical treatment.
  • ✅ An example of availability is an authentication service, which must be constantly available to verify user identities for system access.
  • 📚 Each organization has its own set of policies that determine the specific needs for confidentiality, integrity, and availability, which must be followed accordingly.

Q & A

  • What are the three key objectives of computer security?

    -The three key objectives of computer security are confidentiality, integrity, and availability.

  • What does the term 'confidentiality' in the context of computer security mean?

    -Confidentiality in computer security refers to the protection of information from unauthorized access and disclosure, ensuring that only authorized parties can understand the information being transmitted.

  • How is integrity defined within the CIA triad?

    -Integrity within the CIA triad ensures that the information being transmitted remains unchanged and unaltered during transit, guaranteeing that the receiver gets the exact message sent by the sender without any modifications by unauthorized entities.

  • What does the term 'availability' signify in the context of computer security?

    -Availability in computer security means ensuring timely and reliable access to the information system resources, which implies that the system is operational and accessible when required by the users.

  • What is the role of encryption in achieving confidentiality in computer security?

    -Encryption plays a crucial role in achieving confidentiality by converting the original message into a scrambled text that can only be read by those who possess the correct encryption key, thus preventing unauthorized access to the information.

  • What are the three levels of impact of a security breach?

    -The three levels of impact of a security breach are low level impact (limited adverse effect), medium level impact (serious adverse effect, possibly involving significant loss or life-threatening issues), and high level impact (catastrophic adverse effect, leading to severe damage or complete disaster for the organization).

  • What is the additional element 'authenticity' in the CIA triad, and why is it important?

    -Authenticity is an additional element in the CIA triad that ensures the genuineness of the information and the ability to verify the identity of the parties involved in a transaction. It is important because it helps in establishing trust and ensuring that the information is coming from a trusted source.

  • How is 'accountability' different from the core elements of the CIA triad?

    -Accountability is another additional element that focuses on the responsibility and tracking of actions performed by users within an information system. It is different from the core CIA elements as it deals with maintaining records of activities for forensic analysis and ensuring that users do not misuse their privileges.

  • Why is it crucial to maintain the integrity of patient information in a hospital management system?

    -Maintaining the integrity of patient information is crucial because any unauthorized modification to the data, such as heartbeat rates or medical test results, could lead to incorrect diagnoses and treatments, potentially resulting in life-threatening consequences for the patient.

  • What is the importance of availability in the context of an authentication service?

    -The availability of an authentication service is important because it needs to be accessible at all times to verify users' identities for secure access to systems. If the service is unavailable, users cannot access the system, which can disrupt operations and services.

  • How can the CIA triad help in preventing security breaches?

    -The CIA triad helps prevent security breaches by focusing on three core principles: confidentiality protects information from unauthorized access, integrity ensures data remains unaltered, and availability guarantees consistent access to information systems. Adhering to these principles makes it more difficult for attackers to compromise a system.

  • What is the role of telecommunications in computer security?

    -Telecommunications plays a significant role in computer security as it involves the transmission of data over networks. Protecting telecommunications ensures that data is secure during transit, preventing unauthorized access and ensuring the confidentiality and integrity of the information being exchanged.

Outlines

00:00

😀 Introduction to Computer Security and the CIA Triad

This paragraph introduces the topic of computer security and outlines the learning objectives for the session. The key terms of computer security are defined, emphasizing the importance of integrity, availability, and confidentiality. The National Institute of Standards and Technology (NIST) is credited for the computer security definition. The paragraph also previews the discussion on the CIA triad and the impact levels of security breaches.

05:01

🔒 The CIA Triad: Confidentiality, Integrity, and Availability

The CIA triad is explored in depth, starting with confidentiality, which ensures that information is only accessible to authorized parties. The concept of integrity is then explained, which is about ensuring that data remains unaltered during transmission. Availability ensures that systems are accessible and functional when required. The paragraph also touches on the importance of encryption in maintaining confidentiality and the role of the security system in preventing unauthorized modifications to data.

10:03

📈 Understanding the Levels of Impact of a Security Breach

This section categorizes the impact of security breaches into three levels: low, medium, and high. It explains that a low-level impact results in limited adverse effects, medium-level impact can lead to serious consequences, and a high-level impact signifies a catastrophic event for an organization. The paragraph further elaborates on additional elements of the CIA triad, namely authenticity and accountability, and their significance in information security.

15:04

🌐 Real-World Applications and Expectations of the CIA Triad

The final paragraph provides real-world examples to illustrate the concepts of confidentiality, integrity, and availability. It discusses the encryption of banking information, the integrity of patient data in hospital management systems, and the constant availability of authentication services. The paragraph concludes by emphasizing that every organization has its own set of security policies and requirements, which should be adhered to for effective security management.

Mindmap

Keywords

💡Computer Security

Computer security refers to the protection measures taken to ensure the safety and integrity of computer systems, networks, and data. It is a key theme in the video, as it encompasses the objectives of preserving the integrity, availability, and confidentiality of information system resources. An example from the script is the protection afforded to an automated information system, which includes hardware, software, firmware, information, or data, and telecommunications.

💡CIA Triad

The CIA Triad is a model used to guide information security practices, representing the three core elements of confidentiality, integrity, and availability. In the video, it is the central concept that structures the discussion of computer security objectives. The script elaborates on each element, emphasizing their significance in safeguarding data and services within computer systems.

💡Confidentiality

Confidentiality is one of the key elements of the CIA Triad, focusing on preventing unauthorized access to information. It is defined as the property that information is only accessible to those authorized to view it. In the context of the video, confidentiality is illustrated by the encryption of messages, ensuring that only the sender and the intended receiver can understand the content.

💡Integrity

Integrity, another element of the CIA Triad, ensures that data is accurate and consistent, preventing unauthorized modification. The video defines integrity with the formula 'sent is equal to received,' meaning the receiver should get the exact message sent by the sender without any alterations. An example given is a banking transaction, where the integrity of the transaction amount is crucial to prevent fraud.

💡Availability

Availability is the third element of the CIA Triad, which ensures that information systems are accessible and functional when required by the user. The video emphasizes the importance of availability by using Google's servers as an example, noting that they should be accessible at any time to provide reliable services to users.

💡Security Breach

A security breach is a violation of an information system's security, leading to unauthorized access, exposure, or loss of data. The video outlines three levels of impact of a security breach: low, medium, and high, each with increasing severity and potential consequences for individuals or organizations. The impact levels are used to illustrate the importance of robust security measures.

💡Encryption

Encryption is a method of encoding messages or information to ensure security and confidentiality. It plays a crucial role in achieving confidentiality within computer security. The video mentions that encryption turns data into a scrambled form that only authorized parties with the correct key can decipher, thereby preventing unauthorized access to the information.

💡Telecommunications

Telecommunications refers to the transmission of information over distances through various means, such as networks and wireless signals. In the context of computer security, as discussed in the video, telecommunications security is vital to protect the data being transmitted across networks, ensuring that it remains confidential and secure from interception or tampering.

💡Authenticity

Authenticity, mentioned as an additional element to the CIA Triad, is the property of being genuine and being able to verify the identity of the parties involved in a transaction. The video uses the example of accessing a trusted website like Google, where the server can verify that the request is coming from a legitimate source, ensuring the authenticity of the communication.

💡Accountability

Accountability is another additional element discussed in the video, which relates to the responsibility and tracking of actions within an information system. It is essential for information security as it involves keeping records of user activities, which can be used for forensic analysis in the event of a security breach. This allows for tracing and identifying the source of the breach.

💡Information System Resources

Information system resources encompass the collective components of an information system, including hardware, software, firmware, data, and telecommunications. The video highlights the importance of securing these resources as part of computer security. It is the comprehensive nature of these resources that makes them a target for security breaches, and thus, they require protection to maintain the integrity and confidentiality of the information they hold.

Highlights

The CIA triad is introduced as a fundamental concept in computer security, encompassing Confidentiality, Integrity, and Availability.

Computer security is defined by NIST as the protection provided to an automated information system to preserve integrity, availability, and confidentiality.

Integrity in computer security ensures that data remains unaltered during transmission, maintaining the accuracy of information.

Confidentiality involves protecting data from unauthorized access and disclosure, typically through encryption.

Availability ensures timely and reliable access to the system, even when faced with potential attacks or disruptions.

The importance of telecommunications in computer security is emphasized, highlighting the need to secure data transmission across networks.

The concept of encryption is explained as a method to achieve confidentiality, where only the sender and receiver can understand the message.

Authenticity and accountability are introduced as additional elements to the CIA triad, focusing on verifying the identity of parties and recording user activities.

The impact of a security breach is categorized into low, medium, and high levels, each with increasing severity on organizational operations and assets.

Examples of confidentiality breaches include unauthorized access to banking information, which can be mitigated through encryption.

Integrity is illustrated through the critical nature of medical data, where any modification in patient information could lead to life-threatening consequences.

The necessity for authentication services to be highly available is exemplified by the constant accessibility of services like Google.

Different applications and organizations may have varying requirements for confidentiality, integrity, and availability based on their specific policies.

The lecture concludes with an encouragement for learners to understand the key objectives of computer security and the practical implications of the CIA triad.

The importance of a security system's ability to withstand attacks and maintain service availability is emphasized.

The role of encryption algorithms in maintaining confidentiality is discussed, noting that while the algorithms are public, the keys remain secret.

The lecture provides a comprehensive overview of computer security, including the definition, key objectives, and the impact of security breaches.

Transcripts

play00:03

[Music]

play00:06

hello everyone

play00:07

welcome back in today's lecture we will

play00:09

see the cia triad

play00:12

as usual we will start the session with

play00:14

the outcomes

play00:15

upon the completion of this session the

play00:17

learner will be able to

play00:19

outcome number one we will define

play00:21

computer security

play00:23

outcome number two we will know the key

play00:25

objectives of computer security

play00:27

outcome number three we will understand

play00:29

the c i

play00:30

a triad and outcome number four we will

play00:33

know various levels of

play00:35

impact of security breach before we step

play00:38

into the cia triad

play00:40

let's see the definition of computer

play00:42

security the computer security

play00:44

definition is as follows the protection

play00:46

afforded to an automated information

play00:49

system

play00:49

in order to attain the applicable

play00:51

objectives of preserving

play00:52

the integrity availability and

play00:55

confidentiality of

play00:56

information system resources which

play00:58

includes hardware

play01:00

software firmware information or data

play01:03

and telecommunications and this is the

play01:05

definition of computer security by

play01:07

nist which is a government organization

play01:10

of the united states

play01:12

i know you will find many key terms in

play01:14

the definition

play01:15

i will just provide you an easy way to

play01:17

understand this definition

play01:18

let's figure out the three important key

play01:21

terms of the definition

play01:22

number one the integrity number two the

play01:25

availability

play01:26

and number three confidentiality if we

play01:29

understand all these three key terms

play01:31

then the definition will be easy

play01:33

ultimately we are going to provide

play01:35

security to the system

play01:36

the system includes both hardware and

play01:38

software not only hardware and software

play01:41

we should also focus on the firmwares or

play01:44

the data or the information that is

play01:46

processed by the system

play01:47

and not only this the telecommunications

play01:50

as well

play01:50

what is telecommunications it is the

play01:52

communication

play01:53

at a distance so in this subject we are

play01:55

going to focus

play01:56

on security in all aspects of the

play01:59

computer networks

play02:00

and obviously computer networks has a

play02:03

lot of things to deal with

play02:04

if these three key objectives are clear

play02:07

that is the integrity availability and

play02:09

confidentiality that the definition will

play02:11

be clear

play02:12

anyway we are going to see these three

play02:14

key terms elaborately

play02:16

in the cia triad part let's now step

play02:19

into the cia triad

play02:21

what is the cia triad the name itself

play02:24

says that it is a triad tri means three

play02:26

so there are three key elements of this

play02:29

c i a triad

play02:30

let's see what are the three key

play02:32

elements we can see the first element is

play02:34

the confidentiality

play02:36

the second one is the integrity and the

play02:38

third one is the availability and we can

play02:40

notice that

play02:41

everything is for the data and the

play02:43

services we are going to do with the

play02:45

computer system

play02:46

all right let's see the key terms

play02:48

elaborately firstly we will focus on the

play02:50

first key element

play02:52

the confidentiality when we say

play02:54

something is confidential what do you

play02:56

mean by that

play02:57

it means others should not understand

play02:59

except the parties who are involved in

play03:00

that transaction

play03:02

say if i am drafting a letter to my

play03:03

friend and if i mention that it is

play03:05

confidential

play03:06

this confidential message means it

play03:08

should be known to me

play03:10

as well as to my friend right because

play03:12

these two parties are legitimate parties

play03:14

involved in this transaction

play03:16

now if an anonymous person receives this

play03:18

letter or message

play03:19

and if he sees the message or the

play03:21

content what is there in the transaction

play03:23

then ultimately there is loss of privacy

play03:25

right so obviously we don't have any

play03:27

confidentiality when somebody sees the

play03:29

message

play03:30

so we need to prevent unauthorized

play03:32

access and disclosure

play03:34

unauthorized access means nobody else

play03:36

can access

play03:37

except the right entities who are

play03:39

involved in the transaction and

play03:40

disclosure means the message should not

play03:42

be open enough

play03:43

to be simple if the message is encrypted

play03:46

no one else can see what is the message

play03:48

except the sender and the receiver right

play03:50

because the sender and the receiver only

play03:51

will know what is the message what is

play03:53

the key what is the encryption algorithm

play03:55

everything right

play03:56

generally encryption algorithms are kept

play03:58

public and keys only

play04:00

are kept secret anyway i will talk about

play04:02

this later for time being just

play04:04

understand

play04:04

confidentiality means we need to protect

play04:07

the data that is being transmitted

play04:09

if it is encrypted obviously it provides

play04:11

confidentiality because

play04:13

no one else can see what it is right it

play04:15

is a scrambled text that they are seeing

play04:17

no one else should be able to understand

play04:20

what is the message that is being

play04:21

transmitted between the sender and the

play04:23

receiver

play04:24

this is exactly confidentiality let's

play04:26

come to the second key element

play04:28

in cia triad which is the integrity i

play04:30

will just give you a formula like this

play04:32

sent is equal to received whatever the

play04:36

sender is sending

play04:37

the same message only the receiver

play04:38

should receive for example if you are

play04:40

performing a banking transaction of 1000

play04:43

rupees

play04:44

obviously the transaction should involve

play04:46

only 1 000 rupees

play04:48

what if an attacker modifies this as 10

play04:50

000 rupees

play04:51

not only the modification of amount by

play04:53

the attacker

play04:54

let's assume the destination address or

play04:56

the destination account is given

play04:58

as the attacker's account just imagine

play05:01

this for an example this may not be real

play05:03

and this may not be seeming to be a

play05:04

perfect example

play05:05

but i wanted to make you to understand

play05:07

the severity of modification of message

play05:10

i wanted to explain you what is

play05:11

integrity so we don't want any

play05:14

modification of messages by the

play05:16

unauthorized people

play05:17

say you want to transfer some fund to

play05:19

your friend but unfortunately the fund

play05:22

is being transmitted or transferred

play05:24

to somebody else account that is

play05:25

attackers account obviously this has

play05:28

happened because of the modification

play05:29

of the messages that is being

play05:31

transmitted between the sender and the

play05:32

receiver

play05:33

by the attackers so this transaction

play05:35

should not be permitted by the system

play05:37

and the security system should be able

play05:39

to find out that this is not the message

play05:41

that was sent by the sender

play05:42

in other words the security system

play05:44

should ensure that this is not the

play05:45

transaction that was initiated by the

play05:47

sender

play05:48

so integrity means we need to ensure

play05:50

that there is no modification of the

play05:52

message that is being transmitted

play05:54

so whatever the sender is sending that

play05:57

only the receiver should receive

play05:58

and if there is any modification in the

play06:00

message that is being transmitted the

play06:02

system should be able to find out that

play06:04

and it should discard that message so

play06:06

integrity is also one of the key terms

play06:08

of the cia triad

play06:10

and coming to the third key element

play06:12

which is the availability

play06:14

availability means we need to ensure the

play06:16

timely and the reliable access to the

play06:18

system

play06:19

say for example if you are hitting

play06:20

google.com if you hit now it will work

play06:23

if you hit after one hour it will work

play06:25

if you hit after 10 days it will work

play06:27

because you trust that google server

play06:30

will be always available

play06:32

at the same time there may be many

play06:33

attacks that may be launched against

play06:35

google.com server

play06:36

but still google server is a very

play06:38

secured one and google is able to

play06:40

provide its service to the customers or

play06:42

the users who access it

play06:44

without any flaws so that's the power of

play06:47

a security

play06:48

system i will also provide you one more

play06:50

example imagine you have a bank account

play06:52

and you want to access your banking

play06:54

server

play06:54

you are expecting the banking server to

play06:56

respond you with the requested data

play06:59

what if an attacker has launched an

play07:00

attack on the banking server

play07:02

and disrupted the service so when you

play07:04

access the banking server you are not

play07:06

getting the service that you are

play07:07

expecting

play07:08

obviously we don't encourage that

play07:09

because whenever we want a service we

play07:11

expect the system to provide service to

play07:13

us

play07:13

and this service should be a timely and

play07:16

a reliable service as well

play07:18

there will be attackers always on the

play07:19

internet and our security system is

play07:21

expected to provide security to the

play07:23

system

play07:24

and to the users and whenever any attack

play07:26

is launched on the server

play07:28

we expect the server should withstand

play07:30

that attack it should still be able to

play07:32

provide access to the servers in the

play07:34

same way as it was in the perfect

play07:36

situation

play07:36

and that's it about the cia triad let's

play07:39

now navigate to the levels of impact

play07:41

of security breach when there is a

play07:44

security breach

play07:45

in the organizational data or to the

play07:47

server or to an individual

play07:49

basically there will be three levels of

play07:51

impact number one

play07:52

is the low level impact number two is

play07:55

the medium level impact

play07:56

and number three is the high level

play07:58

impact we will see the various levels of

play08:00

impact of security breach one by one now

play08:03

firstly we will focus on low level

play08:05

impact if your system is affected by

play08:07

some attacks

play08:08

and the low level impact means there is

play08:10

a limited adverse effect

play08:12

on organizations operation or

play08:14

organizational assets or

play08:16

individual that is the system is

play08:18

affected with minor

play08:19

harm or minor damage or in terms of

play08:21

financial aspects

play08:23

it is a minor financial loss if the

play08:26

effect of the attack is negligible then

play08:28

it falls in the low level impact

play08:30

and coming to the next level of impact

play08:32

which is the medium level of impact

play08:34

it has a serious adverse effect on

play08:37

organizational operation

play08:39

or organizational assets or even serious

play08:41

adverse effect on

play08:42

individual so the loss may be a

play08:44

significant loss or a significant damage

play08:47

or a significant harm that is caused to

play08:49

the organization or to the individual

play08:51

and this medium level of impact means

play08:53

the attack may be involving in the loss

play08:55

of life

play08:56

or even serious life threatening issues

play08:58

also

play08:59

and coming to the final level of impact

play09:01

which is the high level impact

play09:02

so when the medium itself is very

play09:04

dangerous think about the high level

play09:06

impact so everything is gone

play09:08

right so the reputation everything high

play09:10

level impact of security breach means

play09:12

the organization

play09:13

has catastrophic adverse effect it means

play09:16

severe adverse effect on organizational

play09:19

operations or organizational assets or

play09:21

individual it is a complete disaster to

play09:24

the organization

play09:25

so these are the three levels of impact

play09:27

of security breach

play09:28

and this could be for an individual or

play09:31

for an organization

play09:32

or for an organizational data or for the

play09:34

information system

play09:36

or for any kind of stuff that really

play09:38

needs security

play09:39

before we step out let's see the

play09:41

additional features of cia triad

play09:44

basically the cia triad includes only

play09:46

three key elements right the

play09:47

confidentiality

play09:48

the integrity and the availability we

play09:51

also have two more additional elements

play09:53

and the additional elements are number

play09:55

one the authenticity and number two

play09:58

accountability authenticity is the

play10:00

property of being genuine and being able

play10:02

to verify the part is

play10:04

involved say if the sender is going to

play10:05

send some message to the receiver

play10:07

say if the receiver is receiving a

play10:09

message and the receiver should be able

play10:11

to verify that the message is from the

play10:13

right party

play10:14

or the message is from the trusted

play10:16

source we will call this property as

play10:18

authenticity in other words let's say

play10:20

you are accessing google.com

play10:22

suppose if you give a request from your

play10:23

browser as www.google.com

play10:26

and you are expecting that your request

play10:27

is going to google server and not any

play10:29

bogus server

play10:30

right when the request is received by

play10:32

google server and google should be able

play10:34

to verify that it is from you

play10:35

so this is we call as authentication or

play10:38

authenticity

play10:39

and coming to the next additional

play10:40

element which is accountability

play10:42

say for example accountability is also

play10:44

an essential part of an information

play10:46

security plan

play10:47

it means every individual who works with

play10:50

an organization or who works with an

play10:51

information system

play10:53

should have specific responsibilities

play10:55

for information

play10:56

assurance every user who access the

play10:58

system has their own roles and

play11:00

responsibilities

play11:01

and whatever the actions the users

play11:03

perform the system should keep records

play11:06

of their activities

play11:07

why system should keep track of the

play11:09

activities because

play11:11

later if any attack is launched or if we

play11:13

find that something is suspicious

play11:15

then the system should permit forensic

play11:17

analysis later

play11:18

to trace the security breaches so in

play11:20

order to do that we need to ensure that

play11:22

the system is

play11:23

accountable every user is given some

play11:25

responsibility

play11:27

and every user should access only to

play11:29

that level of privilege

play11:30

or it must ensure that the users are not

play11:33

misusing their privileges

play11:35

let's see some real time examples for

play11:37

confidentiality

play11:38

integrity and availability the first one

play11:41

we will see

play11:42

is confidentiality for example the

play11:44

banking account information say you have

play11:46

your mobile phone and you have your

play11:48

banking

play11:48

app in your mobile phone if you request

play11:51

some data from your banking server

play11:52

and from the banking server to your

play11:54

mobile phone or to your desktop from

play11:56

where you are going to access

play11:58

the data traffic must be encrypted what

play12:01

if the data is not encrypted

play12:03

obviously there are chances for the

play12:04

attackers to see what information is

play12:06

being transferred between the sender and

play12:08

the receiver

play12:09

so we don't encourage that should happen

play12:11

so encryption is one of the ways we can

play12:13

achieve

play12:14

confidentiality if the message is

play12:16

encrypted

play12:17

except the server and you who are

play12:19

accessing the system

play12:20

no one else can understand what it is so

play12:22

the message must be encrypted

play12:24

encryption is one of the ways to achieve

play12:27

confidentiality

play12:28

coming to the second example which is

play12:30

integrity the patient's information

play12:32

say for example there is a hospital

play12:34

management system let's assume someone

play12:36

is having some disease and that person

play12:38

is installed with some sensors

play12:40

and the sensors are installed on his

play12:42

body in this hospital management system

play12:44

the doctor can be anywhere in the world

play12:47

and the patient can also be anywhere in

play12:49

the world but still doctor and patient

play12:51

relationship

play12:52

can exist seamlessly because of the

play12:53

powerful internet connectivity and the

play12:56

iot concepts the internet of things

play12:58

in this example the patient is wearing a

play13:00

sensor and the patient or doctor need

play13:02

not be in person

play13:04

to do the medical treatment or to get

play13:06

the medical treatment

play13:08

and what is the role of the sensor you

play13:09

know the sensor is going to report the

play13:11

heartbeat rate periodically to the

play13:13

doctor

play13:14

by other servers let's assume the server

play13:16

is going to collect all the heartbeat

play13:18

information that is sent by the sensor

play13:20

so obviously whatever the sensor is

play13:23

sensing the heartbeat value that should

play13:25

be stored without any alteration in the

play13:27

server

play13:28

only then the doctor will be able to

play13:30

provide right treatment to the patient

play13:32

if the sensor is sensing the right value

play13:34

and the right value is sent to the

play13:36

server but

play13:37

during the travel if an attacker is

play13:39

modifying the value

play13:40

and if this modification is stored in

play13:42

the server and when the doctor sees this

play13:44

modified value and

play13:46

is giving some treatment based on this

play13:48

this could be

play13:49

a life threatening issue also it could

play13:52

even lead to lethality or fatality

play13:55

let's assume the heartbeat value that is

play13:56

sensed by the sensor is 70

play13:58

and this 70 is now being transmitted to

play14:01

the receiver that is the server

play14:03

what if the attackers captures this

play14:05

packet and modifies it as 150.

play14:07

so the treatment may go wrong right

play14:09

because of this so all patients

play14:11

information must be

play14:12

confidential and not only confidential

play14:15

it should also have the property of

play14:17

integrity

play14:18

so whatever the sender is sending that

play14:20

only the receiver should receive

play14:22

no modification should be permitted so

play14:24

this is an example for integrity

play14:26

and coming to the next one the

play14:28

availability example

play14:30

authentication service let's assume

play14:31

there is a server which is providing

play14:33

authentication service

play14:34

and whenever user wants to carry out any

play14:36

activity this user must be verified or

play14:39

authenticated by the authentication

play14:40

server

play14:41

and this authentication server should be

play14:43

always available because user may

play14:44

request data access

play14:46

at any point of time so authentication

play14:48

is one of the important services that

play14:50

should be always available

play14:52

we can take google as an example also

play14:54

just think anytime you access google.com

play14:56

you will be able to get the access

play14:58

because google.com server is available

play15:00

all the time

play15:01

and whenever you request any service you

play15:04

should get that service that's what as

play15:05

an end user we will expect right

play15:07

the examples that are shown here just

play15:09

for understanding concepts but in

play15:11

reality

play15:12

every application or every organization

play15:15

has their own set of policies

play15:16

their confidentiality level or their

play15:18

confidentiality need will be different

play15:20

from each other say for example the

play15:23

integrity requirement or the

play15:24

availability requirement or the

play15:26

confidentiality requirement

play15:27

for every individual or an organization

play15:29

varies so it has to be followed as per

play15:31

the policies they frame

play15:33

i hope these examples will help you to

play15:35

understand what is confidentiality

play15:37

integrity and availability and that's it

play15:39

guys i hope now you understood the

play15:41

computer security

play15:42

the key objectives of computer security

play15:44

we also understood the cia triad

play15:47

and we also have seen various levels of

play15:49

impact of security breach

play15:51

i hope you guys enjoyed today's lecture

play15:53

i'll see you in the next lecture and

play15:55

thank you for watching

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Computer SecurityCIA TriadSecurity BreachesConfidentialityIntegrityAvailabilityInformation SystemsCybersecurityData ProtectionTelecommunicationsRisk Management
Besoin d'un résumé en anglais ?