Page 63 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 63

Real-time Data Insights:

            Data is data, but generating real time data insights makes the difference. This dimension ensures that all
            data comes directly from the source. In this case, collected and registered is displayed in real time with
            no third parties tampering the data flow.

            Data Driven Facts:

            Unlike the CIA triad, the T-Trust tenet encourages the use of analytical and data driven approaches to
            make  fact-based  assertions  about  cybersecurity.  This  dimension  is  achievable  with  real  time  data
            insights.

            Proactive Defence: One of the ways to ensure security risk mitigation is through predictive analysis with
            a proactive defence approach. Emerging cyber threats making waves in today’s digital landscape have
            made proactive solutions a necessary recipe for digital trust.

            As seen above, the TRUST tenet is becoming increasingly important as our reliance on technology grows.
            In  the  past  decade,  security  was  primarily  focused  on  protecting  information  and  financial  assets.
            However, as technology becomes more pervasive in our lives, security must also focus on protecting
            people.

            For  example,  a  cyberattack  could  be  used  to  control  critical  infrastructure,  such  as  power  grids  or
            transportation systems. This could lead to loss of life or property damage. This calls for a CIAT framework
            (confidentiality,  integrity,  availability,  and  trust)  which  provides  a  more  comprehensive  approach  to
            cybersecurity.




            Conclusion
            The conventional CIA triad of confidentiality, integrity, and availability (CIA) is a good starting point for
            defining cybersecurity, but it is just one side of the coin. In order to evolve to a safe and secure digital
            era, there’s a need to shift focus from “standard cybersecurity” to “Digital Trust”. Admittedly, the security
            risk profile has shifted from just information and financial loss to loss of life. This means that the "trust"
            dimension must take center stage as a new definition of cybersecurity.

            To build confidence in the responsible consumption and usage of emerging technologies, our digital
            ecosystem and services must adhere to not only confidentiality, integrity, or availability, but also the trust
            tenet. As a result, the "CIA" must be changed to "CIAT" for cybersecurity. By incorporating the trust tenet,
            or CIAT, organizations can better protect their data, systems, and people.















                                                                                                              63
   58   59   60   61   62   63   64   65   66   67   68