The CIA principle
One of the widely acceptable security model is the CIA triad, which stands for Confidentiality, Integrity and …show more content…
Cryptography and Encryption methods are best ways to ensure confidentiality of data transferred from one computer to another.
Integrity: The ability to ensure that data is an accurate and unchanged representation of the original secure information. One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.
Availability: The best way to ensure Availability is by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a correctly functioning operating system environment that is free of software conflicts. It is also very important to keep current with all necessary system upgrades.
There are different types of solutions available, depending on the nature of the attack to defend against. Certain possible approaches are:
• Security by Design
Certain issues can be addressed by identifying and sticking to a set of guidelines such as writing secure code one must specify that particular library functions are considered "unsafe" and alternatives should be used. A program, which exhibits insecure behavior, can be rewritten to avoid