Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Hybrid Cloud for Architects

You're reading from   Hybrid Cloud for Architects Build robust hybrid cloud solutions using AWS and OpenStack

Arrow left icon
Product type Paperback
Published in Feb 2018
Publisher Packt
ISBN-13 9781788623513
Length 290 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Alok Shrivastwa Alok Shrivastwa
Author Profile Icon Alok Shrivastwa
Alok Shrivastwa
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Title Page
Copyright and Credits
Software Hardware List
Packt Upsell
Contributors
Preface
1. Introducing Hybrid Cloud FREE CHAPTER 2. Hybrid Cloud – Why Does It Matter? 3. Hybrid Cloud Building Blocks 4. Architecting the Underpinning Services 5. Hybrid Cloud Deployment – Architecture and Preparation 6. Building a Traditional CMP-Based Hybrid Cloud 7. Building a Containerized Hybrid Cloud 8. Using PreBuilt Hybrid Cloud Solutions 9. DevOps in the Hybrid Cloud 10. Monitoring the Hybrid Cloud 11. Security in a Hybrid Cloud 1. Other Books You May Enjoy Index

Components of security


Security is such a vast topic that even a book to cover it will fall short, let alone a chapter. In this section, we will discuss the base components of security and its definitions. 

The CIA triad

The core of information security mainly focuses on the CIA triad, which stands for confidentiality, integrity, and availability of data.

Confidentiality

The data confidentiality principle dictates that access should be allowed only on a need-to-know basis, which means, by default, block all access and only open access when necessary.

Let's take a banking example to elucidate the principles. Say someone comes into the bank and requests to know your bank balance, and is successful. This would be considered a breach in confidentiality.

Integrity

The principle of data integrity is to protect the data from being modified in an unauthorized way while at rest or in motion. The prevention and detection of data tampering falls under this.

Extending the same bank example, say you have given...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime
Visually different images