Protecting the Integrity, Availability, and Confidentiality of Network Data
Now that we understand how networks are built and the technologies and devices that run them, we are ready to look at some of the technologies and techniques that we can use to protect the integrity, availability, and confidentiality of transactions over networks.
The CIA Triad
Information systems security can be addressed by applying the concepts of the CIA triad in the following ways:
Confidentiality— Confidentiality is simply ensuring that the data transmitted is only able to be read by the intended recipient. The loss of confidentiality can occur in many ways—for example, through the intentional disclosure of information or through lax security procedures. Confidentiality ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.