EP 85: The CIA triad - The Basis of Cyber Security (Integrity)

Release Date:


https://www.yourcyberpath.com/85/

In this episode, Kip and Jason discuss the second pillar of the CIA pentagram, Integrity.

 The whole idea of integrity is making sure any entity that you interact with has not been modified after creation and exists where it needs to be.

 Jason mentions how it's not always a perfect balance between all the pillars of the pentagram but depending on the real-world situation, the solution tends to lean towards one or more of the pillars.

 Kip explains how digital signatures work and what are the best use cases for them, while Jason dives in deep explaining how hashes work and how to best utilize them.

 Again, Kip and Jason go over some interview questions to give you an idea of what kind of questions you might encounter, and what a good answer sound like.

 Jason then finalizes the episode with a great reminder to always make sure you to test restore backups every few weeks when setting up integrity and backups in your organization.

What You’ll Learn

●     What are some real-world examples of integrity?

●     What is hashing? and how do we use it?

●    What are digital signatures?

●    How can you verify a file's integrity?

Relevant Websites For This Episode

●     www.YourCyberPath.com

Other Relevant Episodes

●     Episode 62 - The NIST Cybersecurity Framework

●      Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)

EP 85: The CIA triad - The Basis of Cyber Security (Integrity)

Title
EP 85: The CIA triad - The Basis of Cyber Security (Integrity)
Copyright
Release Date

flashback