Cybersecurity Fundamentals

Req 3b — The CIA Triad

3b.
Explain the “C.I.A. Triad”—Confidentiality, Integrity, and Availability—and why these three principles are fundamental to cybersecurity.

Every cybersecurity decision — every firewall rule, every password policy, every encryption algorithm — traces back to three principles. They are so central to the field that professionals call them the CIA Triad (no relation to the government agency). If you understand these three concepts, you have the foundation for understanding everything else in cybersecurity.

Confidentiality

Confidentiality means that information is accessible only to the people who are authorized to see it. Your text messages should be readable only by you and the person you sent them to. Your medical records should be accessible only to you and your doctor. Your password should be known only to you.

How confidentiality is maintained:

What happens when confidentiality fails:

When a company suffers a data breach, confidentiality has failed. Names, emails, passwords, credit card numbers — information that was supposed to be private — becomes public. The 2017 Equifax breach exposed the personal data of 147 million people, including Social Security numbers.

Integrity

Integrity means that information is accurate and has not been tampered with. When you send a message, it should arrive exactly as you wrote it. When your bank shows your account balance, that number should be correct. When a hospital looks up your blood type, that record better not have been changed by someone.

How integrity is maintained:

What happens when integrity fails:

Imagine a hacker changes one digit in a wire transfer from $1,000 to $1,000,000. Or modifies a patient’s medical record to show a different blood type. Or alters election results in a database. Integrity failures can cause financial loss, physical harm, or loss of trust in institutions.

Availability

Availability means that systems and data are accessible when authorized users need them. The best encryption and access controls in the world are useless if the system is down and nobody can reach it. A hospital’s electronic medical records are critical — if a cyberattack makes them unavailable during an emergency surgery, lives are at risk.

How availability is maintained:

What happens when availability fails:

Denial-of-Service (DoS) attacks flood a server with so much traffic that legitimate users cannot get through — like a thousand people calling the same phone number at once so no real calls can connect. Ransomware attacks encrypt an organization’s files and demand payment for the decryption key, making data unavailable until the ransom is paid (or backups are restored).

How the Three Work Together

The CIA Triad is a triad because all three principles must be balanced. Focusing too much on one can undermine another:

Good cybersecurity finds the right balance among all three, based on what the system needs. A military database prioritizes confidentiality. A news website prioritizes availability. A banking system needs all three equally.

What Is the CIA Triad? — Coursera A clear overview of the CIA Triad with examples from real-world cybersecurity applications.
The CIA Triad triangle diagram showing Confidentiality, Integrity, and Availability