Knowledge Hub: From the Desk of Aswini Srinath
Understanding the CIA Triad: Simplifying Cybersecurity Basics
Aspect Definition Objective Easy Example
Ensures information is A password-protected online
accessible only to Prevent unauthorized access banking account ensures only
Confidentiality
authorized individuals or or disclosure. the account holder can view
systems. their transactions.
A financial report is digitally
Maintains the accuracy signed to ensure no
Prevent unauthorized
Integrity and consistency of data unauthorized changes are
modification of data.
throughout its lifecycle. made after the report is
finalized.
A company's website has a
Ensures authorized users
Prevent downtime or access backup server to ensure users
Availability have reliable access to
issues. can access it even if the main
information and systems.
server goes down.
Key Points for Each:
1. Confidentiality:
Tools: Encryption, Access Control Lists (ACLs).
Example Breach: A hacker intercepting emails containing sensitive information.
2. Integrity:
Tools: Checksums, Hashing, Digital Signatures.
Example Breach: A cybercriminal modifies a payroll database to increase their salary.
3. Availability:
Tools: Redundant Systems, Disaster Recovery Plans.
Example Breach: A Distributed Denial of Service (DDoS) attack makes an e-commerce site unavailable during
a sale.