In: Computer Science
Provide a scenario that illustrates an example of:
A breach to confidentiality
A breach to integrity
A breach to availability
CIA ( Confidentiality, Integrity, and availability) are the three pillars for the Information security of an organization. Confidentiality ensures that the information to be accessible and used by only the authorized person, Integrity ensures that information or data is authentic and trustworthy and Availability ensures information is available every time whenever it is needed.
Breach to confidentiality
Whenever there is a loss of privacy, there is a breach of confidentiality. For example, sales leads of an organization are leaked to other companies. In this scenario, the sales leads are highly confidential but they are leaked. So, we can say there is a confidentiality breach.
Breach to Integrity
Whenever an unauthorized person changes the information and making it not trustworthy, there is a breach of confidentiality. For example, an authorized person has changed the sales lead's contact detail. So, we can say the Integrity exams are breached.
Breach to availability
Whenever an unauthorized person vanishes the information and making it not available for the authorized person is termed as a breach of availability. For example, an unauthorized person has destroyed the sales leads and making it not available. So, we can say the availability of exams is breached.