
Sign up to save your podcasts
Or
The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security. Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.1. CONFIDENTIALITYMost information systems house information that has some degree of sensitivity. It might be proprietary business information that competitors could use to their advantage, or personal information regarding an organization’s employees, customers or clients.2. INTEGRITYIntegrity is about -- how well you protect the information from unauthorized alteration of any kind or the destruction. These measures provide assurance that your data is highly accurate and complete, and no untoward change has been made. The concept of integrity dictates that your data which is stored on your systems and which is transmitted between systems such as email remains intact throughout.3. AVAILABILITYYour information system must be available to your authorized users all the time.Merely four days ago on Date: 14-December-2020, for example, a large many services of Google Inc such as YouTube, Hangout, Gmail, Google Maps, Google Photos, etc went down for some 45-minutes worldwide._
Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm
How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯
https://www.youtube.com/watch?v=84gNIEmCEAA
If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.
Thanks,
Meena R.
Your 'Cyber Warrior' Friend
_
YOU CAN FOLLOW ME AT:
Facebook Page : https://www.facebook.com/cybersec.prism
Instagram: https://www.instagram.com/meena.cyber.warrior/
Linkedin Profile: https://www.linkedin.com/in/meena1/
About ME: https://www.youtube.com/watch?v=T66K3K5Y2tI
YouTube Channel: https://www.youtube.com/@cybersecurityforever8214
Hear My Podcast: https://anchor.fm/meena-r
Linkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/
Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/
**
Here are more resources:
**
-
Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)
_
https://luminisindia.com/cybersecurity-prism
_
You can also watch 👀 all the videos ofCybersecurity Series there:
_
Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/
YouTube : https://www.youtube.com/@cybersecurityforever8214
_
Gateway ⛩ to Cybersecurity
--
https://luminisindia.com/goehm
_
The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster...
_
✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh
_
Are you willing to learn Networking now?
Would you like to watch some videos of Networking, CCNARouting & Switching, etc?
_
https://luminisindia.com/networking-free
_
❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓
--
https://luminisindia.com/free-ccna-security-presentations
_
The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security. Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.1. CONFIDENTIALITYMost information systems house information that has some degree of sensitivity. It might be proprietary business information that competitors could use to their advantage, or personal information regarding an organization’s employees, customers or clients.2. INTEGRITYIntegrity is about -- how well you protect the information from unauthorized alteration of any kind or the destruction. These measures provide assurance that your data is highly accurate and complete, and no untoward change has been made. The concept of integrity dictates that your data which is stored on your systems and which is transmitted between systems such as email remains intact throughout.3. AVAILABILITYYour information system must be available to your authorized users all the time.Merely four days ago on Date: 14-December-2020, for example, a large many services of Google Inc such as YouTube, Hangout, Gmail, Google Maps, Google Photos, etc went down for some 45-minutes worldwide._
Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm
How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯
https://www.youtube.com/watch?v=84gNIEmCEAA
If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.
Thanks,
Meena R.
Your 'Cyber Warrior' Friend
_
YOU CAN FOLLOW ME AT:
Facebook Page : https://www.facebook.com/cybersec.prism
Instagram: https://www.instagram.com/meena.cyber.warrior/
Linkedin Profile: https://www.linkedin.com/in/meena1/
About ME: https://www.youtube.com/watch?v=T66K3K5Y2tI
YouTube Channel: https://www.youtube.com/@cybersecurityforever8214
Hear My Podcast: https://anchor.fm/meena-r
Linkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/
Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/
**
Here are more resources:
**
-
Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)
_
https://luminisindia.com/cybersecurity-prism
_
You can also watch 👀 all the videos ofCybersecurity Series there:
_
Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/
YouTube : https://www.youtube.com/@cybersecurityforever8214
_
Gateway ⛩ to Cybersecurity
--
https://luminisindia.com/goehm
_
The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster...
_
✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh
_
Are you willing to learn Networking now?
Would you like to watch some videos of Networking, CCNARouting & Switching, etc?
_
https://luminisindia.com/networking-free
_
❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓
--
https://luminisindia.com/free-ccna-security-presentations
_
21 Listeners