CIA Triad
The pillars of the CIA Triad in Cybersecurity are Confidentiality, Integrity, and Availability
(as well as Non-repudiation and Authenticity).
How it works
Take the interactive steps to swap-out your insecure configurations for our secure ones.
If this were represented by code, it might look something like this:
copy
var InteractiveSteps = (function(){
var steps = $('.js-steps-interactive');
steps.each(function() {
var step = $(this);
var config = config = {
headerTag: "h4",
transitionEffect: "fade",
labels: {
current: ''
}
}
var userConfig = step.data('config');
$.extend(true, config, userConfig);
steps.steps(config);
});
})();
Where do I get an overview?
To get a concise, high-level understanding of a subject without delving into excessive detail, consider a quick browse around the site at first. Then, on your second time around, might we suggest a deeper dive.
How do I request a feature?
How do I update?
Consectetur quae eveniet ab ipsa velit, veniam aliquam dolor quos dolore. Maxime vitae recusandae, quam tempore perspiciatis magni odit asperiores cumque incidunt, blanditiis architecto, facere iure dolores nesciunt illo laborum quaerat!