<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>confidentiality Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/confidentiality/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/confidentiality/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Thu, 09 Sep 2021 00:53:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>confidentiality Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/confidentiality/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Explanation of the Cybersecurity CIA Triad</title>
		<link>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/</link>
					<comments>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 22:27:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[availability]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[cybersecurity cia triad]]></category>
		<category><![CDATA[integrity]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2589</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of the Cybersecurity CIA Triad, and the opposite &#8211; DAD, and covers the following: CIA = Confidentiality, Integrity, and Availability Technologies used for each: Confidentiality = Encryption Integrity = Hashing Availability = Load-Balancers, Hot Sites DAD = Disclosure, Alteration, and Destruction/Denial Check out my latest [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/">Explanation of the Cybersecurity CIA Triad</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="alignright wp-image-2591 " src="https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283.jpg" alt="cybersecurity cia triad" width="360" height="212" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283.jpg 638w, https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283-300x177.jpg 300w" sizes="(max-width: 360px) 100vw, 360px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of the Cybersecurity CIA Triad, and the opposite &#8211; DAD, and covers the following:</p>
<ul>
<li>CIA = Confidentiality, Integrity, and Availability</li>
<li>Technologies used for each:
<ul>
<li>Confidentiality = Encryption</li>
<li>Integrity = Hashing</li>
<li>Availability = Load-Balancers, Hot Sites</li>
</ul>
</li>
<li>DAD = Disclosure, Alteration, and Destruction/Denial</li>
</ul>
<ul>
<li style="list-style-type: none;"></li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need cybersecurity help? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="Explanation of the Cybersecurity CIA Triad" width="500" height="281" src="https://www.youtube.com/embed/v62YNGFJWfc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Cybersecurity CIA Triad Explanation Video Transcript</h2>
<p>Hey everybody. This is Christian Espinosa with Alpine Security. Today&#8217;s topic is on CIA, not the Central Intelligence Agency, but confidentiality, integrity and availability. These three things are what we try to achieve with cybersecurity.</p>
<p>With confidentiality, we&#8217;re trying to prevent unauthorized disclosure of our data. The technology we typically use with confidentiality is encryption. So I want to encrypt my data in transit and at rest. So if I&#8217;m sending some data to Amazon, such as my credit card number, and somebody intercepts it, they can&#8217;t read the data unless they have the encryption key. It&#8217;s kept secret. If somebody steals my hard drive and I&#8217;ve encrypted my hard drive, my data is not disclosed to them unless they can decrypt the hard drive. So confidentiality, the technology we use is encryption.</p>
<p>Integrity is to make sure our data is not altered, either intentionally or unintentionally. That technology we use for integrity is <a href="https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/" target="_blank" rel="noopener">hashing</a>. So if we use a hashing algorithm, such as MD5, SHA1, SHA512, if we use any of those, we take the data, we run it through this hash algorithm, it spits out what&#8217;s called the message digest, that if I send you the data, you run the data you received from me through the same hash algorithm, you get a message digest. If your message digest matches, sorry, my message digest, then the data has not been altered. So that&#8217;s hashing and that&#8217;s used to prevent alteration or to see if data has been altered.</p>
<p>The a stands for availability. If the data is not available, it&#8217;s kind of useless. With availability, we typically use things like load balancers, backup sites, hot sites, mirrored sites, et cetera for availability.</p>
<p>The opposite of CIA, is DAD. That stands for disclosure, alteration and destruction. With disclosure, it&#8217;s the opposite of confidentiality. So if your data is disclose to me or to a hacker, you have no longer achieved the objective of confidentiality. With the A, alteration, if your data is supposed to have integrity, but I&#8217;m able to alter it. Let&#8217;s say I go to your shopping cart and I can change the price of your thousand dollar item to $1 then I&#8217;ve altered your data and that is not achieving integrity. The other D stands for destruction or denial of service. So if I&#8217;m able to destroy your system, like your server, or do it the of service on your server, then I have removed the availability of your system to your users. So that&#8217;s DAD, disclosure, alteration and destruction.</p>
<p>I hope you enjoyed this. Quick tutorial on CIA and DAD. If you have any questions or comments leave them beneath the video. Please subscribe to our channel. Thanks. I&#8217;ll talk to you later.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/">Explanation of the Cybersecurity CIA Triad</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
