Data Security - Confidentiality, Integrity & Availability | kVA (2024)

With vehicles becoming more connected and their systems relying more on complex networked information, protecting the information is a priority task.

Think of information as all the bits and pieces that are gathered about something or someone. In a vehicle, information covers the details of the user, the information exchanged between electronic systems, and, even the software that is stored to make the systems work. Cybersecurity simply means that the information is protected against criminal or unauthorized use and/or that measures are taken to achieve this.

When we analyze cybersecurity, the first step is to look into the C-I-A triad, which is a well-known model for cybersecurity development. C-I-A stands for Confidentiality, Integrity and Availability – these security concepts help to guide cybersecurity policies. Automotive systems and related infrastructure must be protected against deliberate or accidental compromise of confidentiality, integrity or availability of the information that they store, process and communicate without hindering safety and functionality. It is important to understand each of these concepts because all risks, threats and vulnerabilities are measured for their potential capability to compromise one or all of these principles.

  • Confidentiality ensures that data exchanged is not accessible to unauthorized users. The users could be applications, processes, other systems and/or humans. When designing a system, adequate control mechanisms to enforce confidentiality should be in place, as well as policies that dictate what authorized users can and cannot do with the data. The more sensitive the data, the higher the level of confidentiality. Therefore, all sensitive data should always be controlled and monitored.To maintain confidentiality in automotive systems, data needs to be protected inside and outside the vehicle, while it is stored (data at rest), while it is transmitted (data in motion), and while it is being processed (data in use). Memory protection can be applied to data in use. Cryptography is excellent for protecting the confidentiality of data at rest and data in motion, but keep in mind that it imposes computational complexity and increases latency, so it should be used with caution in time-sensitive systems.
  • Integrity is the ability to ensure that a system and its data has not suffered unauthorized modification. Integrity protection protects not only data, but also operating systems, applications and hardware from being altered by unauthorized individuals. In automotive systems, CRC is known to provide integrity protection against accidental or non-malicious errors; however, it is not suitable for protecting against intentional alteration of data. Hence, the sensitive data should include cryptographic checksums for verification of integrity. Moreover, mechanisms should be in place to detect when integrity has been violated and to restore any affected system or data back to their correct state.
  • Availability guarantees that systems, applications and data are available to users when they need them. The most common attack that impacts availability is denial-of-service in which the attacker interrupts access to information, system, devices or other network resources. A denial-of-service in an internal vehicular network could result in an ECU not being able to access the information needed to operate and the ECU could become nonoperational or even worst it could bring the system to an unsafe state. To avoid availability problems, it is necessary to include redundancy paths and failover strategies in the design stage, as well as to include intrusion prevention systems that can monitor network traffic pattern, determine if there is an anomaly and block network traffic when needed.

The C-I-A triad is a very fundamental security model, but as with any model there is room for improvement; other attributes such as non-repudiation and authentication are important and needed to be considered too. But at least, ensuring that the three aspects of the C-I-A triad are covered is an important first step towards designing any secure system.

If you want to know more about cybersecurity processes, related standards, and their impact on the automotive industry, come to our two day UL-CCSP training in automotive.

Data Security - Confidentiality, Integrity & Availability | kVA (2024)

FAQs

What is confidentiality integrity and availability in security system? ›

Put simply, confidentiality is limiting data access, integrity is ensuring your data is accurate, and availability is making sure it is accessible to those who need it. This triad can be used as a foundation to develop strong information security policies. What is Confidentiality?

What are the four 4 elements of data security? ›

In general, data security can be broken down into four main elements: Confidentiality, Integrity, Authenticity, and Availability.

What are the 3 principles of data security? ›

The basic tenets of information security are confidentiality, integrity, and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

Is the CIA triad outdated? ›

With the rise of Artificial Intelligence (AI) and autonomous technologies, the traditional Confidentiality, Integrity & Availability "CIA Triad" further demonstrates its insufficiency due to its avoidance of a safety component for cybersecurity practices.

What are two methods that ensure confidentiality? ›

Confidentiality refers to mechanisms that ensure that only authorized individuals may access secure information. Cryptography and Encryption are examples of methods used to ensure confidentiality of data.

What are the 4 P's in security? ›

In general, Information Security professionals suggest that protecting sensitive data requires a combination of people, processes, polices, and technologies.

What is the 4 C's in security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What are the 4 pillars of information security? ›

Every security posture is built on four pillars:

Prevention: Preparing and training before a threat/attack. Protection: Stopping a known threat/attack. Detection: Detecting an unknown threat/attack. Response: Taking action towards a threat/attack.

What are the three pillars of data security? ›

One framework that serves as a foundation for information security is the CIA Triad, consisting of three pillars: confidentiality, integrity, and availability. Let's delve into each pillar to understand its significance and how they collectively contribute to maintaining a secure environment for data.

How can availability be compromised? ›

Availability can also be compromised through deliberate acts of sabotage, such as the use of denial-of-service (DoS) attacks or ransomware. To ensure availability, organizations can use redundant networks, servers, and applications.

What are the 7 GDPR requirements? ›

Lawfulness, fairness, and transparency; ▪ Purpose limitation; ▪ Data minimisation; ▪ Accuracy; ▪ Storage limitation; ▪ Integrity and confidentiality; and ▪ Accountability. These principles are found right at the outset of the GDPR, and inform and permeate all other provisions of that legislation.

What is the difference between data confidentiality and data integrity? ›

Confidentiality protects information (data) from unauthorized access. Integrity is the accuracy and consistency of data as well as the completeness and reliability of systems. Availability is the ability for users to access systems and information when needed, even under duress.

What is dad triad? ›

We adopt security policies in enterprises or individually model the CIA triad from a protection perspective. However, attackers have their own model too. This model consists of three pillars: disclosure, alteration, and denial (which is also abbreviated as the “DAD” triad).

Why is CIA controversial? ›

The CIA has been called into question for, at times, using torture, funding and training of groups and organizations that would later participate in killing of civilians and other non-combatants and would try or succeed in overthrowing democratically elected governments, human experimentation, and targeted killings and ...

What is integrity and confidentiality security? ›

(a) Confidentiality means that only people who have a need to know and are authorised to use the Personal Data can access it. (b) Integrity means that Personal Data is accurate and suitable for the purpose for which it is processed.

What is the Hipaa security Rule confidentiality integrity and availability? ›

The HIPAA Security Rule requires physicians to protect patients' electronically stored, protected health information (known as “ePHI”) by using appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity and security of this information.

What are the four pillars of information security accountability availability confidentiality and integrity? ›

Fundamental Principles of Information Security

There are four main principles of information security: confidentiality, integrity, availability, and non-repudiation.

Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6240

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.