Got it

The Overview of the CIA Triad- PART 02

Latest reply: Jan 5, 2022 09:07:43 448 16 13 0 0

The Overview of the CIA Triad


HI Hi, Greetings!  i_f47.gif 

Happy December i_f25.gif


Today, I would like to share with you an article about the overview of the CIA Tired. Let's move to the article and I will explain part by part.


PART 02:


2. INTEGRITY :


Integrity refers to how well you safeguard information against unauthorized modification or destruction. These safeguards ensure that your data is accurate and complete and that no unauthorized changes have been made. The concept of integrity states that all data saved on your systems, as well as data exchanged between systems, such as email, is kept intact.


To keep sensitive practical integrity, you must not only limit access at the system level but also ensure that your system users can only change information that they are officially permitted to change.


Unintentional tampering, such as user errors or data loss as a result of any system failure, must also be protected by effective integrity countermeasures.


Take the finance industry, for example, where there is a pressing need to ensure that all transactions across its systems/sub-systems are completely safe and unaffected by manipulation.


In February 2016, cyber hackers created $1 billion in fraudulent withdrawals from the Central Bank of Bangladesh's account at the Federal Reserve Bank of New York, making it one of the most well-known financial data integrity breaches in recent history. The hackers devised a complex scheme that included obtaining the necessary credentials to initiate the withdrawals, as well as infecting the banking system with malware that deleted the transfer database records and suppressed the confirmation messages that would have alerted banking authorities to the fraud. Although most of the transfers were halted or the funds recovered when the plan was revealed, the crooks were still able to make off with more than $60 million.


III


There are a variety of countermeasures you can use to protect integrity:


  • Access control and strict authentication can assist in preventing unwanted changes by authorized users.


  • Hash verification and digital signatures can assist in confirming that transactions are genuine and that files haven't been tampered with.


  • Administrative controls such as division of roles and training are also critical in ensuring data integrity.



You are welcome to like and leave feedback in the comment area. 


Link: 


PART 01:

The Overview of the CIA Triad- PART 01



PART 03:


Source: 


  • https://www.forcepoint.com/cyber-edu/cia-triad

  • https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html


M M Zaheer Hussain

Stay Safe!

tt


The post is synchronized to: Community Blog

Thanks for your sharing
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 21, 2021 05:09:24 (0) (0)
Thanks  
good one
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 17, 2021 11:37:53 (0) (0)
Great  
Interesting. Thank you for sharing!
View more
  • x
  • convention:

Very helpful content
View more
  • x
  • convention:

GOOD THANKS
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 25, 2021 17:16:38 (0) (0)
 
Important information
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 25, 2021 17:16:30 (0) (0)
Thanks dear  
andersoncf1
MVE Author Created Dec 25, 2021 19:30:51

Well done
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 26, 2021 04:05:03 (0) (0)
Awesome  
Great, thank you for sharing!
View more
  • x
  • convention:

Great, thank you for sharing!
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.