0% found this document useful (0 votes)
33 views1 page

Understanding the CIA Triad in Cybersecurity

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

Understanding the CIA Triad in Cybersecurity

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Knowledge Hub: From the Desk of Aswini Srinath

Understanding the CIA Triad: Simplifying Cybersecurity Basics

Aspect Definition Objective Easy Example

Ensures information is A password-protected online


accessible only to Prevent unauthorized access banking account ensures only
Confidentiality
authorized individuals or or disclosure. the account holder can view
systems. their transactions.

A financial report is digitally


Maintains the accuracy signed to ensure no
Prevent unauthorized
Integrity and consistency of data unauthorized changes are
modification of data.
throughout its lifecycle. made after the report is
finalized.

A company's website has a


Ensures authorized users
Prevent downtime or access backup server to ensure users
Availability have reliable access to
issues. can access it even if the main
information and systems.
server goes down.

Key Points for Each:

1. Confidentiality:
Tools: Encryption, Access Control Lists (ACLs).
Example Breach: A hacker intercepting emails containing sensitive information.

2. Integrity:
Tools: Checksums, Hashing, Digital Signatures.
Example Breach: A cybercriminal modifies a payroll database to increase their salary.

3. Availability:
Tools: Redundant Systems, Disaster Recovery Plans.
Example Breach: A Distributed Denial of Service (DDoS) attack makes an e-commerce site unavailable during
a sale.

You might also like