December 7, 2018 By Sue Poremba 4 min read

Most security systems today are built with data confidentiality in mind. This is a crucial exercise, but confidentiality only makes up for one dimension of data privacy. As security expert Bruce Schneier told the audience at SpiceWorld 2018, the time has come to reconsider our understanding of data privacy and how we strategize for it.

Because of the ways data is used today, we need to distribute more of that focus onto protecting the integrity and availability of data.

Learn the CIA Triad

More security professionals have begun to follow the CIA triad: confidentiality, integrity and availability. Together, these represent the most important aspects of data security.

Confidentiality — the current emphasis of data privacy — is about regulating the amount of access individuals and third-party organizations have to personal data as defined by thoroughly structured classification guidelines, according to Infosec Institute.

Integrity, meanwhile, “makes sure that the information is not tampered whenever it travels from source to destination or even stored at rest,” while the “availability concept is to make sure that the services of an organization are available.”

Examples of availability threats are denial-of-service (DoS) attacks and ransomware, both of which prevent users from accessing files or websites. An example of an integrity attack is a threat actor accessing an account to manipulate information, such as changing the numbers in a bank account — even if nothing is stolen, the information is no longer accurate.

Because the Internet of Things (IoT) now connects humans and machines in ways never seen before, integrity and availability threats are much worse than confidentiality threats, Schneier told the SpiceWorld attendees.

“The effects are greater because they affect life and property,” he said. “I’m concerned that someone could go in and steal my hospital records, but I’m more concerned that they don’t change my blood type.”

Shift the Way You Think of Data Privacy

The biggest security incidents of the past few years have revolved around data confidentiality issues. Cybercriminals have been able to steal credit card information, names, birth dates, Social Security numbers and even biometric data such as fingerprints that are part of a government worker’s security clearance files.

It’s no wonder in our present milieu that consumers are upset when their data confidentiality is compromised. Privacy regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are primarily designed to keep information confidential while giving control of that information to its rightful owner: the consumer.

However, GDPR also requires companies to make data readily available to consumers if there is a security incident. Schneier pointed out that data privacy has moved beyond consumer data, the information that surrounds an individual’s identity. We now have to consider the data generated by cars, home thermostats, drones, smart cities, medical devices, critical infrastructure and military systems — anything that is connected and generates data.

“We are starting to see DDoS attacks against critical systems,” Schneier said. “We are starting to see ransomware attacks on cars.”

We have to recognize the practical implications of attacks that target each element of the CIA triad. There is a fundamental difference between a spreadsheet crash leading to a loss of patient data and an IoT-connected pacemaker crash leading to a loss of life, so prioritize your security strategies accordingly. When integrity and availability of the data is given greater emphasis, we can design security systems to address potential vulnerabilities and attack vectors.

Protect Data Integrity With Backups and Audits

Addressing data integrity will involve aspects of data confidentiality, because files that are difficult to access are even more difficult to manipulate. A critical aspect of data integrity is ensuring that the information is accurate and unchanged. Backup systems are vital to protect data integrity as a way to check what is currently on file with what was on file before a suspected cybersecurity incident.

Regular audits of data managed by your organization will also provide a snapshot of what the files should look like over time. Is the information changing when it should be constant? Have the ebbs and flows been regular, or have they taken an unusual turn?

The better you know your data, the better you can ensure its integrity. Also, the fewer people touching the data, the better. Too many employees accessing or editing the data increases the chances of someone making an error that goes undetected until it is too late.

Data Availability Can Be the Difference Between Life and Death

Data availability ensures that relevant information is quickly accessible after a breach. Again, this is bolstered by having a solid backup or data loss recovery system in place.

Think about situations where availability could be an issue in your organization. Is there potential for a ransomware attack? A distributed denial-of-service (DDoS) attack? Infrastructure that is old and unprepared for a natural disaster or breach attempt?

Having a secondary source can protect against data availability risks. A data center in a different part of the country or world, cloud services that can restore a website’s accessibility in minutes, and tools and awareness training to lower the risk of ransomware attacks are all ways to decrease potential data loss and downtime.

Due to the increasing connectedness of the cyber world, confidentiality can no longer be handled as the sole aspect of data privacy. Improving the confidentiality, integrity and availability of data is critical not only for privacy issues, but as the potential difference between life and death.

More from Data Protection

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today