Page 16 - CyberSecurityEssentialsEnglish
P. 16
CIA Triad Model
Confidentiality, Integrity, and Availability are represented by the three letters "CIA triad." The CIA triad is a prominent
model that is the foundation for creating security systems. This model is an essential starting point for new use cases,
products, and technologies. It was used to direct security executives and teams in developing their security strategy,
rules, and controls; as shown in figure 3.
Figure 3 CIA Triad Model
This model has three pillars:
Confidentiality: Means protecting private information from unauthorized people that should not have access
to it.
Integrity: Refers to data integrity. This involves ensuring data is consistent, reliable and accurate.
Availability: Refers to data being consistently and reliably available to those authorized.
National Cybersecurity Bodies
National Computer Emergency Response Teams (CERTs) provide services that aim to secure the country's
cyberspace and protect its digital assets and individuals from cyber threats or attacks. To this end, the
Egyptian Computer Emergency Readiness Team (EG-CERT) and the Egyptian Supreme Cybersecurity Council
(ESCC) were formed to provide cybersecurity services for the Egyptian government.
Egyptian Computer Emergency Readiness Team (EG-CERT)
Established by the National Telecom Regulatory Authority (NTRA) in April 2009, is staffed by highly-skilled
professionals and provides 24-hour support to protect critical information infrastructure. In light of its myriad
mandates, EG-CERT has been handling cyber threats by providing several cybersecurity services: incident
handling, threat intelligence, and penetration testing. EG-CERT has been supporting governmental entities,
helping them tackle and respond to cybersecurity-related events.
The Egyptian Supreme Cybersecurity Council (ESCC)
The Egyptian Cabinet established the Egyptian Supreme Cybersecurity Council (ESCC) in 2014, commissioning
it to develop the National Cybersecurity Strategic Plan. Such a strategy aims to harden the security of Egyptian
cyberspace and eliminate all threats and malicious actors, raising the level of readiness to repel cyber risks in
all sectors of the country by implementing the decisions and recommendations.
14

