The Overview of the CIA Triad
HI Hi, Greetings!
Happy December 
Today, I would like to share with you an article about the overview of the CIA Tired. Let's move to the article and I will explain part by part.
PART 03:
3. AVAILABILITY
Your information system must be accessible at all times to your authorized users.
For example, a large number of Google Inc. services, such as YouTube, Hangout, Gmail, Google Maps, Google Photos, and others, went down for 45 minutes just four days ago, on December 14, 2020.
A Google spokeswoman said in a statement, "Google's authentication system went down for around 45 minutes today at 3.47 a.m. PT due to an internal storage quota issue." During this time, services that needed users to log in novice users had high error rates. At 4:32 a.m. PT, the authentication system issue was rectified. All services have been restored at this time. " This is a fantastic example of an outage and the idea of a Breach of Availability. You now have a better understanding of it.
The term "availability" refers to your users' ability to access your information system in a timely and uninterrupted manner. Hardware failures, unannounced software downtime, network bandwidth challenges, the breakdown of any sub-system, and other non-malicious threats to availability are only a few of the most basic threats to availability. Malicious attacks, on the other hand, can comprise a variety of sabotage attempts aimed at causing damage to your organization by denying your users access to the information system.
Your website's (or cloud-based service's) availability (and responsiveness) will undoubtedly be a top issue for you. You must understand that even a brief interruption in website availability can result in revenue loss, client unhappiness, and reputation damage for your company. Hackers regularly use Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks to disrupt web services of all kinds. DoS attacks overwhelm a server with unnecessary requests, causing it to overload and degrade service for real customers.
Service providers have developed complex countermeasures for detecting and protecting against DoS/DDoS attacks over time, but hackers continue to improve their sophistication, and such attacks are always a threat.
The challenges to system availability are as diverse as the availability countermeasures used to protect it.
Systems with a high demand for continuous uptime should have extensive hardware redundancy, including backup servers and data storage that can be accessed promptly.
It is usual to have redundant systems in distinct physical locations for large enterprise systems.
Software tools for monitoring system performance and network traffic should be in place.
Firewalls and routers are examples of countermeasures for DDoS attacks.
You are welcome to like and leave feedback in the comment area.
Link:
PART 01:
The Overview of the CIA Triad- PART 01
PART 03:
Source:
https://www.forcepoint.com/cyber-edu/cia-triad
https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
M M Zaheer Hussain
Stay Safe!



