Mechanisms

These three principles, often referred to as the CIA Triad (Confidentiality, Integrity, Availability), serve as the cornerstone of information security and guide the implementation of various security mechanisms to protect digital assets and maintain the trustworthiness of computer systems.

Computer Security #2 Confidentiality

Confidentiality (C)

Confidentiality involves the protection of sensitive information from unauthorized access or disclosure. It ensures that only authorized individuals or entities can access and view specific data. Encryption, access controls, user authentication, and secure communication protocols are some of the mechanisms used to maintain confidentiality.

Computer Security #3 Integrity

Integrity (I)

Integrity refers to the assurance that data has not been altered or tampered with in an unauthorized or unintended manner. Data integrity ensures that information remains accurate, consistent, and trustworthy throughout its lifecycle. Mechanisms to ensure integrity include cryptographic checksums, digital signatures, access controls, and audit trails.

Computer Security #4 Availability

Availability  (A)

Availability ensures that systems and data are accessible and functional when needed. It guards against downtime, outages, and disruptions that could hinder users' ability to access resources. Redundancy, fault tolerance, backup systems, and disaster recovery plans are mechanisms employed to ensure high availability.