Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is CIA Triad

Contemporary Challenges for Cyber Security and Data Privacy
CIA in cyber security terms refers to confidentiality, integrity and availability, and these represent the objectives of cyber security as regards data and information. Cyber security is meant to ensure data are confidential (kept away from those not authorized to access); integrity by ensuring data is not tampered with or contaminated; and the data is available to authorized users when they need to access it.
Published in Chapter:
The Role of Blockchain Technology in Organizational Cyber Security
Dauda Sule (Air Force Institute of Technology, Kaduna, Nigeria), Jude Enenche Ameh (Sheffield Hallam University, UK), and Suleiman Abu Usman (Air Force Institute of Technology, Kaduna, Nigeria)
Copyright: © 2023 |Pages: 19
DOI: 10.4018/979-8-3693-1528-6.ch004
Abstract
Distributed ledger technology (DLT), decentralized finance (DeFi), blockchain – these are terms that have been trending especially in technology circles. Today, blockchain has gained more acceptance, but sceptics continue to raise concerns about the technology's scalability, security, and long-term viability. There are also concerns regarding its being associated with crime and the dark web, which might imply it will have negative consequences if adopted. It has its own peculiar cyber security loopholes, but these can be addressed. That notwithstanding, organizations stand to gain from the blockchain in terms of cyber security; especially its qualities of decentralization and immutability. It has been successfully implemented in some sectors with positive results. This chapter seeks to illustrate how the blockchain can be used to boost and optimize cyber security for organizations.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
Common term used to refer to the confidentiality, integrity, and availability of information. It is this triad that information security mechanisms must seek to protect.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR