1 hour 4 minutes
in this lesson, we'll talk about the CIA. Tried
the principle of least privilege and separation of Judy's.
What is the C. I. A. Triad?
See A Triad stands for confidentiality, integrity and availability,
which are three tenets of cybersecurity.
The C I A tryout, which I suspect you are familiar with. If you're watching, this course
consists off confidentiality, integrity and availability.
There are several ways in which this triad effects enterprise Security Case Management
Festival security teams need to ensure that stakeholders only have as much access as required to perform their duties.
A stock analyst or incident responders, for example, should be able to both read and write to case management software,
whereas a size oh may only need read access. To be able to review case data and reports allowing greater access than is necessary violates the principle of lease privilege and can cause numerous issues related to confidentiality of case, data and evidence.
For the same reasons. Integrity needs to be top of mind for anyone involved in security case management.
If contemporaneous notes, case data or evidence is able to be modified by someone without the requisite authorization,
none of the results of a case or investigation can be relied upon
protecting the integrity of case data. And evidence is paramount to the success of a case management program and a security team off any type.
availability should be a consideration as well.
If case data or a case management solution become unavailable during the course of an investigation,
valuable case data may be lost. While actions of being carried out,
it is vital to the success of a case that availability be made a priority.
What does the acronym C II Stanfel
C I. A. Stands for confidentiality, integrity and availability,
Sometimes to prevent confusion with the clandestine organization
the CIA try. It is actually the icy Try it
or the AI C. Try it
in this lesson we covered the CIA, tried the principle of lease privilege as well as separation of Judy's.
Enterprise Security Case Management
In this online course about Enterprise Security Case Management, you will learn about tools and techniques which help cybersecurity practitioners manage evidence and related case data to preserve their integrity.