Got it

The Overview of the CIA Triad PART-03

Latest reply: Jan 5, 2022 09:07:54 416 14 13 0 0

The Overview of the CIA Triad


HI Hi, Greetings!  i_f47.gif 

Happy December i_f25.gif


Today, I would like to share with you an article about the overview of the CIA Tired. Let's move to the article and I will explain part by part.


PART 03:


3. AVAILABILITY

 

Your information system must be accessible at all times to your authorized users.

 

For example, a large number of Google Inc. services, such as YouTube, Hangout, Gmail, Google Maps, Google Photos, and others, went down for 45 minutes just four days ago, on December 14, 2020.

 

A Google spokeswoman said in a statement, "Google's authentication system went down for around 45 minutes today at 3.47 a.m. PT due to an internal storage quota issue." During this time, services that needed users to log in novice users had high error rates. At 4:32 a.m. PT, the authentication system issue was rectified. All services have been restored at this time. " This is a fantastic example of an outage and the idea of a Breach of Availability. You now have a better understanding of it.

 

The term "availability" refers to your users' ability to access your information system in a timely and uninterrupted manner. Hardware failures, unannounced software downtime, network bandwidth challenges, the breakdown of any sub-system, and other non-malicious threats to availability are only a few of the most basic threats to availability. Malicious attacks, on the other hand, can comprise a variety of sabotage attempts aimed at causing damage to your organization by denying your users access to the information system.

 

Your website's (or cloud-based service's) availability (and responsiveness) will undoubtedly be a top issue for you. You must understand that even a brief interruption in website availability can result in revenue loss, client unhappiness, and reputation damage for your company. Hackers regularly use Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks to disrupt web services of all kinds. DoS attacks overwhelm a server with unnecessary requests, causing it to overload and degrade service for real customers.

 

Service providers have developed complex countermeasures for detecting and protecting against DoS/DDoS attacks over time, but hackers continue to improve their sophistication, and such attacks are always a threat.

 

The challenges to system availability are as diverse as the availability countermeasures used to protect it.

 

  • Systems with a high demand for continuous uptime should have extensive hardware redundancy, including backup servers and data storage that can be accessed promptly.

 

  • It is usual to have redundant systems in distinct physical locations for large enterprise systems.

 

  • Software tools for monitoring system performance and network traffic should be in place.

 

  • Firewalls and routers are examples of countermeasures for DDoS attacks.


You are welcome to like and leave feedback in the comment area. 


Link: 


PART 01:

The Overview of the CIA Triad- PART 01



PART 03:


Source: 


  • https://www.forcepoint.com/cyber-edu/cia-triad

  • https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html


M M Zaheer Hussain

Stay Safe!

tt

The post is synchronized to: Community Blog

Thanks for your sharing
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 21, 2021 05:09:37 (0) (0)
Thanks  
hemin88
Moderator Author Created Dec 16, 2021 19:36:47

Great Overview about CIA Triad, thanks for sharing
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 17, 2021 11:37:10 (0) (0)
Great  
explained completely
View more
  • x
  • convention:

zaheernew
zaheernew Created Dec 17, 2021 11:37:03 (0) (0)
Great  
Thanks for your sharing
View more
  • x
  • convention:

Quality post. Thanks for sharing!
View more
  • x
  • convention:

Interesting. Thank you for sharing!
View more
  • x
  • convention:

AL_93
Moderator Created Dec 17, 2021 14:56:21

Very helpful content
View more
  • x
  • convention:

Well done, thank you for sharing!
View more
  • x
  • convention:

IndianKid
Moderator Author Created Dec 25, 2021 04:20:48

very useful article about Overview of the CIA Triad, Thanks
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.