Nov 9, 2025
| Component | Purpose | Main Techniques/Tools |
|---|---|---|
| Confidentiality | Prevent unauthorized access | Encryption, Access Control, Data Masking |
| Integrity | Data accuracy and consistency | Hashing, Digital Signature, Checksums |
| Availability | Accessible when needed | Redundancy, Disaster Recovery, Load Balancing |
| Authentication | User/device identity verification | Password, Token, Biometric, MFA |
| Authorization | Access permission control | RBAC, ABAC, DAC |
| Non-Repudiation | Prevent denial of actions | Digital Signature, Audit Trail |
| Accountability & Auditing | Responsibility and monitoring | Logging, Monitoring, SIEM, Audits |
| Risk Management | Risk reduction | Risk Assessment, Mitigation, BCP |
| Incident Response | Incident handling | Prepare, Identify, Eradicate, Recover, Lessons |
| Physical Security | Physical level protection | CCTV, Biometric, Face Recognition |
| Security Awareness | User awareness | Phishing Simulation, Best Practices, Updates |