Skip to content

Security

CIA Triad

CIA Triad is the foundational concept in IT security.

Confidentiality: ensuring that information can be only accessed by the authorized people or machine.

Integrity: ensuring the data is accurate, complete, and not be modified.

Availability: ensuring that information and resources are available to authorized users when needed.

The CIA triad is used as a guideline to help organizations establish security policies and procedures to protect their information assets.

Golden Guideline

These three "Au" could be used as a foundational golden guideline to solve security problems, which may arise during the lifecycle of an interaction with systems.

Authentication: Who are you?
Authorization: What can you do?
Audit: What did you do?

Additionally, consider the following principles:

Encryption: Ensures data integrity and protects data confidentiality against unauthorized access. Durability: Ensures data durability through methods such as backups, RAID 5, and replication.

NIST Cyber Security Framework (CSF 2.0)

Govern Identity Protect Detect Respond Recover
* Organizational Context
* Risk Management Strategy
* Roles, Responsibilities, and Authorities
* Policy
* Oversight
* Cybersecurity Supply Chain Risk Management
* Asset Management
* Risk Management
* Improvement
* Identity Management, Authentication, and Access Control
* Awareness and Training
* Data Security
* Platform Security
* Technology Infrastructure Resilience
* Continuous Monitoring
* Adverse Event Analysis
* Incident Management
* Incident Analysis
* Incident Response Reporting and Communication
* Incident Mitigation
* Incident Recovery Plan Execution
* Incident Recovery Communication

  1. 安全攻防技能30讲 - 极客时间 何为舟 

  2. NIST Cybersecurity Framework