Page 63 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 63
Real-time Data Insights:
Data is data, but generating real time data insights makes the difference. This dimension ensures that all
data comes directly from the source. In this case, collected and registered is displayed in real time with
no third parties tampering the data flow.
Data Driven Facts:
Unlike the CIA triad, the T-Trust tenet encourages the use of analytical and data driven approaches to
make fact-based assertions about cybersecurity. This dimension is achievable with real time data
insights.
Proactive Defence: One of the ways to ensure security risk mitigation is through predictive analysis with
a proactive defence approach. Emerging cyber threats making waves in today’s digital landscape have
made proactive solutions a necessary recipe for digital trust.
As seen above, the TRUST tenet is becoming increasingly important as our reliance on technology grows.
In the past decade, security was primarily focused on protecting information and financial assets.
However, as technology becomes more pervasive in our lives, security must also focus on protecting
people.
For example, a cyberattack could be used to control critical infrastructure, such as power grids or
transportation systems. This could lead to loss of life or property damage. This calls for a CIAT framework
(confidentiality, integrity, availability, and trust) which provides a more comprehensive approach to
cybersecurity.
Conclusion
The conventional CIA triad of confidentiality, integrity, and availability (CIA) is a good starting point for
defining cybersecurity, but it is just one side of the coin. In order to evolve to a safe and secure digital
era, there’s a need to shift focus from “standard cybersecurity” to “Digital Trust”. Admittedly, the security
risk profile has shifted from just information and financial loss to loss of life. This means that the "trust"
dimension must take center stage as a new definition of cybersecurity.
To build confidence in the responsible consumption and usage of emerging technologies, our digital
ecosystem and services must adhere to not only confidentiality, integrity, or availability, but also the trust
tenet. As a result, the "CIA" must be changed to "CIAT" for cybersecurity. By incorporating the trust tenet,
or CIAT, organizations can better protect their data, systems, and people.
63