SPONSORS

SPONSORS

Using the CIA and AAA Models to Explain Cybersecurity Activities

COMMENTARY

By Livinus Obiora Nweke

Rome, Italy

 



Abstract

Cybersecurity is a broad field that is mainly concerned with protecting the confidentiality, integrity, and availability of computing devices and networks, hardware and software, and most importantly, data and information. Cybersecurity cannot be achieved through technology alone, it also involves the use of procedures, products and people. The goal of this article is to use the CIA model and AAA model to explain the activities of cybersecurity.

Keywords: Cybersecurity, CIA model, AAA models

Introduction

Cybersecurity refers to protecting the confidentiality, integrity, and availability of computing devices and networks, hardware and software, and most importantly, data and information. Cybersecurity involves times when data or information is in transit, being processed, and at rest. It is achieved through procedures, products and people. Also, it requires knowing who the attackers are, what their motivations are, where the vulnerabilities lie, and how protected the systems are. The security mindset involves thinking about how things can be made to fail. The following explains the CIA model, which refers to the three important goals of cybersecurity and the AAA model, which describes one of the methods through which the objectives of cybersecurity are achieved.

CIA Model

The CIA model describes the three important goals of cybersecurity. The C stands for confidentiality. Cybersecurity requires privacy in data and information. Certain people, devices, or processes should be permitted or restricted from seeing data, files, and items, like username, password combinations, medical records, etc. Confidentiality is concerned with viewing of data or information because if the wrong people see data or information they are not authorized, many problems could arise.

The I in the CIA model stands for integrity. Cybersecurity requires us to feel safe that data transmitted, processed, and stored has not been changed from its original form either accidentally or maliciously. For example, if one bit of a message is change, the whole message could change. Also, the whole message could be corrupted or unreadable.

For the last letter A, it stands for availability. Availability guarantees that with all the cybersecurity measures in place for dealing with hardware, software, people, processes and more, users who are authorized to do their job should be able to do so. It requires that authorized users should be able to access the resources they need to do their job with easy while ensuring that the system have full tolerance and load balancing in the event of cybersecurity incident or disaster.

More…

To read entire article, click here

 

________________________________________


About the Author


Livinus Obiora Nweke

Sapienza University
Rome, Italy

 



Livinus O. Nweke
is currently pursuing his Master’s degree in Computer Science at Sapienza University of Rome, Italy and a MicroMasters in Cybersecurity at EDx/RITx. Livinus holds a Bachelor’s of Science degree in Computer Science from University of the People, Pasadena, CA, USA and a Higher National Diploma in Electrical Electronics Engineering from Institute of Management and Technology, Enugu, Nigeria. During five years of professional experience, Livinus has held titles such as Computer Consultant, Senior Technologist, IT Officer, and Customer Care/IT Support Officer.

Livinus may be contacted at [email protected]