34 lines
2.3 KiB
Typst
34 lines
2.3 KiB
Typst
#let isUsed = state("ciaIsUsed", false)
|
|
|
|
// Return the table cell formatted according to its content - for use with CIA values
|
|
#let colorize(str) = {
|
|
if str == "H" {
|
|
table.cell(str, fill: red, align: center)
|
|
} else if str == "L" {
|
|
table.cell(str, fill: yellow, align: center)
|
|
} else if str == "N" {
|
|
table.cell(str, fill: lime, align: center)
|
|
} else if str == "-" {
|
|
table.cell(str, fill: white, align: center)
|
|
} else {
|
|
panic("Unknown CIA state: " + str)
|
|
}
|
|
context(isUsed.update(true))
|
|
}
|
|
|
|
#let appendix() = {
|
|
[
|
|
== CIA Triad
|
|
|
|
The CIA triad is a fundamental framework for information security that encompasses three important principles: confidentiality, integrity, and availability. In this report, each of the three principles is used to highlight specific aspects of the security implications for the area under observation. All three principles are explained in more detail below.
|
|
|
|
=== Confidentiality (C)
|
|
The principle of confidentiality means that information is only accessible to authorized users or entities. It protects sensitive data from unauthorized access or disclosure through measures such as encryption, access controls, and data classification. By maintaining confidentiality, companies reduce the risks of data breaches and unauthorized disclosure, thereby preserving the privacy and trustworthiness of their information assets.
|
|
|
|
=== Integrity (I)
|
|
Integrity preserves the accuracy, consistency, and reliability of data. It prevents unauthorized changes, deletions, or falsifications through techniques such as checksums, digital signatures, and access controls. By maintaining data integrity, companies ensure the reliability and credibility of their information assets, thereby minimizing the risk of fraud or manipulation.
|
|
|
|
=== Availability (A)
|
|
Availability ensures the smooth and reliable provision of information. Potential interruptions to services, systems, or networks are mitigated through redundancy, failover mechanisms, and disaster recovery planning. By maintaining high availability, companies maintain operational continuity and user satisfaction by mitigating the impact of downtime or failures. At the same time, the unavailability of information can have serious consequences, such as lost revenue.
|
|
]
|
|
} |