The CIA Triad and Thinking in First Principles (Part 1 of 3)
[1] S. Samonas and D. Coss, “The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security,” Journal of Information System Security, vol. 10, no. 3, pp. 21–45, 2014.
[2] J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,” Proceedings of the IEEE, vol. 63, no. 9, pp. 1278–1308, Sep. 1975, doi: 10.1109/PROC.1975.9939.
[3] 14:00-17:00, “ISO/IEC 27000:2018,” ISO. https://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/07/39/73906.html (accessed Apr. 05, 2022).
[4] B. Lundgren and N. Möller, “Defining Information Security,” Sci Eng Ethics, vol. 25, no. 2, pp. 419–441, Apr. 2019, doi: 10.1007/s11948-017-9992-1.
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.