Who is the creator of the CIA triad

0 votes
Was the widely recognized CIA triad (Confidentiality, Integrity, Availability) developed by a specific individual or organization, or did it evolve over time as a security framework?
Dec 26, 2024 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
30 views

1 answer to this question.

0 votes

The CIA triad, representing Confidentiality, Integrity, and Availability, is a foundational model in information security. While the specific term "CIA triad" was first documented in the JSC – NASA Information Security Plan in 1989, the principles it embodies have been integral to information security practices for much longer.

The concept of safeguarding information through confidentiality, ensuring its accuracy and consistency (integrity), and guaranteeing its availability when needed, has been a cornerstone of security strategies for decades. However, attributing the creation of the CIA triad to a single individual or organization is challenging, as it evolved over time through collective contributions from various experts and institutions in the field of information security.

answered Dec 26, 2024 by CaLLmeDaDDY
• 13,760 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
0 answers

what is cia triad in cyber security

What does the 'CIA Triad' represent in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
600 views
0 votes
1 answer
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
181 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
344 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
188 views
+1 vote
1 answer
0 votes
1 answer

How is authentication related to the CIA triad?

Authentication is a fundamental component of the ...READ MORE

answered Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
41 views
+1 vote
1 answer

What is the role of WHOIS data in DNS footprinting and how can I automate retrieval?

WHOIS data is essential in DNS footprinting ...READ MORE

answered Oct 21, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
222 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP