Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Integrity – It’s a Matter of Trust
  • Cyber Attacks
  • Data Breach
  • Malware

Integrity – It’s a Matter of Trust

5 years ago Bob Covello
Integrity – It’s a Matter of Trust

When you think of the cybersecurity “CIA” triad of Confidentiality, Integrity, and Availability, which one of those is most important to your organization? 

From a privacy standpoint, confidentiality reigns supreme. Confidentiality is so important that it is codified into many of the cyber regulations of recent years, most notably the California Consumer Privacy Act (CCPA), as well as others. 

If you approach the CIA triad from a strict business mindset, then availability is probably a prime concern. After all, if the data in unavailable, your business is also unavailable.

It seems that integrity is often given a casual thought and dismissed with little more than a shrug. Is it because it is just not as visceral as the thought of a privacy violation or as important as five-nines (99.999%) availability? Tripwire’s white paper “Closing the Integrity Gap with NIST’s Cybersecurity Framework” takes a fresh look at the importance of maintaining data integrity.

In recent years, ransomware prevention has been the main focus of business. The horribly disruptive criminal act of encrypting a company’s data and then holding it hostage has come to be seen as a breach event. With some of the newer ransomware strains that first steal the data and threaten the publication of it if the ransom is not paid, ransomware has become a privacy breach, as well.  However, the Tripwire document points out that a ransomware attack is a data integrity attack. 

“Integrity is really at the heart of information security protections for any system,” says Ron Ross, Fellow for NIST. “Because if someone is able to indiscriminately change an application or a piece of data or the BIOS instructions or anything within the computing stack—whether the customer s aware or not aware of those changes—then that really attacks the basic underpinnings of an information system, along with everyone’s trust in it.”

That statement brings to light the true problem of an integrity compromise: trust.  When we think of any time that we have lost trust in anything, we are reminded how long, if ever, it takes for us to trust again. 

Whether you want to argue that this is “mincing words” or assert that confidentiality and availability are still the most important aspects of data security doesn’t matter. One thing for certain is that if we ignore any aspect of the CIA triad, we are not thinking like the enemy, thus leaving a gap in our defenses.

It’s an equilateral triangle, with no open ends and no side more important than the other. Each side flows with the next, equally.

The Tripwire white paper explores how the NIST Cybersecurity Framework (CSF) can be applied to close the integrity gap. Of course, the CSF is best used in tandem with other NIST documents, such as Special Publication 800-53, which offers guidance on security controls for protecting information systems.

Anyone who has taken a peek at the NIST SP800-53 document may quickly be unnerved by its scope and length. However, your journey towards securing the often-overlooked integrity side of the CIA triad can be eased with the help of Tripwire. Tripwire offers an integrated suite of foundational controls that deliver integrity assurance closely aligned with NIST guidance.

To learn more, download a copy of the white paper here.

The post ” Integrity – It’s a Matter of Trust” appeared first on TripWire

Source:TripWire – Bob Covello

Tags: Compliance, Goverment, Malware, Privacy, Ransomware, TripWire

Continue Reading

Previous Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out
Next Hackers Set Up a Fake Cybersecurity Firm to Target Security Experts

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

3 days ago [email protected] (The Hacker News)

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT