<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hamza Mehmood</title>
    <description>The latest articles on DEV Community by Hamza Mehmood (@hamzamehmood).</description>
    <link>https://dev.to/hamzamehmood</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F707305%2F47cdc97c-f1a3-40a1-8340-94c6440d4f08.png</url>
      <title>DEV Community: Hamza Mehmood</title>
      <link>https://dev.to/hamzamehmood</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hamzamehmood"/>
    <language>en</language>
    <item>
      <title>CIA Triad</title>
      <dc:creator>Hamza Mehmood</dc:creator>
      <pubDate>Sun, 19 Sep 2021 19:30:34 +0000</pubDate>
      <link>https://dev.to/hamzamehmood/cia-triad-2e0f</link>
      <guid>https://dev.to/hamzamehmood/cia-triad-2e0f</guid>
      <description>&lt;p&gt;The CIA triad is the major, common and basic principle that is used for the development of security systems, policies, and procedures. It is also used to identify threats or vulnerabilities and provides effective solutions. CIA triad plays a vital role in the daily routine processes and security of an organization.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--S5Skd6gz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n5e9vx49nn661o4vc9ub.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--S5Skd6gz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n5e9vx49nn661o4vc9ub.png" alt="alt text"&gt;&lt;/a&gt;&lt;br&gt;
         Definition of CIA Triad in Examples.&lt;/p&gt;

&lt;p&gt;Confidentiality: Confidentiality means to keep something private and secret. Suppose I have given you a book and if no one knows that I have given you that book and the book is with you. Then the confidentiality of the book is not compromised.&lt;/p&gt;

&lt;p&gt;Integrity: Integrity is defined as, no one should have access to the book to edit, modify and misplace the book. If the book is misplaced, edited, stolen, or copied then the integrity of the book will be compromised.&lt;/p&gt;

&lt;p&gt;Availability: Availability is defined as, whenever the book is required it must be available for use or studying purposes for the authorized personnel. If not then the availability of the book is said to be compromised. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--j5sJJclB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rufaes20p3cuya4f8v79.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--j5sJJclB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rufaes20p3cuya4f8v79.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You may assume the book as data. Data and information are the most valuable assets for the organization. If the CIA triad is not implemented on the data then the data is not safe.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>confidentiality</category>
      <category>availability</category>
      <category>integrity</category>
    </item>
    <item>
      <title>What is Cybersecurity?</title>
      <dc:creator>Hamza Mehmood</dc:creator>
      <pubDate>Sun, 19 Sep 2021 19:07:30 +0000</pubDate>
      <link>https://dev.to/hamzamehmood/what-is-cybersecurity-301l</link>
      <guid>https://dev.to/hamzamehmood/what-is-cybersecurity-301l</guid>
      <description>&lt;p&gt;The process of utilizing all the policies and protocols to stop or minimize the Cyber crimes is referred as Cybersecurity. &lt;/p&gt;

&lt;p&gt;Nowadays, Cyber-crimes are quite common these days. All such organizations that are storing their data in the information systems are at risk. The information systems include computers, mobiles, laptops, etc, and all of these devices are connected to the internet via wireless, Ethernet, or by any other means. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lFAoQv2n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f0iivz2c2q7pszu03efo.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lFAoQv2n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f0iivz2c2q7pszu03efo.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With every passing minute there is a security issue related to these systems because their confidentiality, integrity and availability is very important.&lt;/p&gt;

&lt;p&gt;The world is progressing rapidly but still the Cyber crimes are quite common. There is no system in the world that is 100% secure. So we are supposed to work in this domain to protect our system from every sort of attack and this is not possible without Cybersecurity.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>websecurity</category>
      <category>datasecurity</category>
    </item>
    <item>
      <title>First post</title>
      <dc:creator>Hamza Mehmood</dc:creator>
      <pubDate>Thu, 16 Sep 2021 11:54:40 +0000</pubDate>
      <link>https://dev.to/hamzamehmood/this-is-my-first-post-8io</link>
      <guid>https://dev.to/hamzamehmood/this-is-my-first-post-8io</guid>
      <description>&lt;p&gt;This is my first post. I am a Cyber security student. I have this account to share the knowledge that I have for you related to cybersecurity.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
