Applying the Four Standards of Security-Based CIA

Constant change in the technology landscape has been mirrored by the steady evolution of information security. The current information system environment is increasingly complex, comprising storage, servers, LANs/WANs, workstations, Unified Communications, Intranet, and Internet connections.

Read more

Does Cloud Computing Really Create any New Security Risks?

Short answer: No.

We can think about the risks associated with public cloud computing in terms of the CIA triad, which are:

Confidentiality – Information is only available to those who are authorized to use it
Integrity – Information is what it purports to be. Transactions are authentic and unmodified in flight
Availability – Information is accessible when it’s needed

If we consider a public cloud solution from a standpoint of CIA, we quickly realize that the security risks that are associated with cloud are not really new risks.

Read more