For example, proper
implementation of data protection may help mitigate confidentiality risks, but
may also reduce availability (e.g., if data cannot be decrypted or is decrypted
slowly), which could increase availability risks.
Technical means such as cryptographic algorithms/ authentication
mechanisms are used to protect data confidentiality and authorization. These
technical means are able to prevent most common cybersecurity attacks.
Non-technical means such as
security response centre, JIMI maintaining services are used to keep
availability of device.