Availability

24th December 2019 | Cybrary Availability


Availability is the property of being accessible and usable upon demand, where in cyber security it applies to assets such as information or information systems. Information may be confidential in the cyber world, which affects the availability of information or information systems.

How does Availability affect SMBs?

As an SMB, it is important to have information and data readily available to your employees or your customers. It is important to also consider the integrity and confidentiality of the data you possess.  An authentication process ensures the user(s) accessing your critical or sensitive data is an authorized and trusted user. For example, a bank only gives you access to your account information through their mobile application once you provide both a password and biometric authentication such as facial recognition or a texted one-time password. This ensures you are who you say you are and the bank is confident they’re protecting your confidentiality.  The Mobile app protects the data from arbitrary changes which could impact the integrity (what is your bank balance showing?  Is it accurate).  And the Bank has the responsibility for making sure their online banking is always up and running so your data is Available to you.  This represents the trifecta of data protection.

Related Terms: Privacy, Confidentiality, Integrity

Source: CNSSI 4009, NIST SP 800-53 Rev 4, 44 U.S.C., Sec 3542

To learn more about this topic, watch this short informational video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more