Describe the critical factors of information security.

Description should include

  • explaining that the confidentiality/integrity/availability (CIA) triad model provides the baseline standard of evaluating and implementing information security measures on any system
  • stating that each component in the CIA triad has designated goals that provide distinct requirements, and that each goal provides an essential component of information security measures
  • identifying the following goals within the CIA triad and defining the terms as they apply to cybersecurity:
    • Confidentiality: The goal ensures that data are only accessed by authorized person(s) through security measures such as user names and passwords and access control lists (ACL).
    • Integrity: The goal ensures the data are trusted. This means data must be guarded against unauthorized changes. Methods of ensuring integrity include data permissions and encryption.
    • Availability: The goal is to provide solutions to ensure that systems can be accessed when requested. This includes providing deploying system protections and proper hardware maintenance and system patching.
    • Additional components should include the following:
      • Authentication: A process in which credentials are provided to verify the identity of an entity (e.g., user, system).
      • Nonrepudiation: A cryptologic technique that provides the proof of the integrity and origin of data.

Description should also include manufacturing system-specific elements:

  • Priority of the CIA triad based on specific critical infrastructure sectors
  • Emphasis on Availability and Integrity in manufacturing systems

Process/Skill Questions:

  • With regard to cybersecurity, CIA stands for what?
  • What does availability mean with regard to cybersecurity?
  • Why is data integrity important?
  • Why is there is a trade-off between confidentiality, integrity, and availability?