Learning Library

← Back to Library

Cybersecurity 101: CIA and PDR

Key Points

  • Cybersecurity revolves around the CIA triad—confidentiality, integrity, and availability—which defines the core goals of protecting data and systems.
  • To achieve the CIA objectives, practitioners follow the PDR framework: prevention, detection, and response.
  • Prevention tools include cryptography, multi‑factor authentication, and role‑based access control to keep data secret and restrict access.
  • Detection relies on logging, monitoring, and SIEM solutions, while response is handled through incident response processes and modern SOAR platforms for automated remediation.

Full Transcript

# Cybersecurity 101: CIA and PDR **Source:** [https://www.youtube.com/watch?v=-BbPHZOE398](https://www.youtube.com/watch?v=-BbPHZOE398) **Duration:** 00:05:28 ## Summary - Cybersecurity revolves around the CIA triad—confidentiality, integrity, and availability—which defines the core goals of protecting data and systems. - To achieve the CIA objectives, practitioners follow the PDR framework: prevention, detection, and response. - Prevention tools include cryptography, multi‑factor authentication, and role‑based access control to keep data secret and restrict access. - Detection relies on logging, monitoring, and SIEM solutions, while response is handled through incident response processes and modern SOAR platforms for automated remediation. ## Sections - [00:00:00](https://www.youtube.com/watch?v=-BbPHZOE398&t=0s) **Cybersecurity Basics: The CIA Triad** - The speaker simplifies cybersecurity by introducing the CIA triad—confidentiality, integrity, and availability—as the core objectives and explains their significance. - [00:03:02](https://www.youtube.com/watch?v=-BbPHZOE398&t=182s) **From Incident Response to SOAR** - The speaker contrasts traditional incident response with modern SOAR, highlighting automation and orchestration while stressing that effective security also requires the balanced integration of people, process, and technology. ## Full Transcript
0:00Cybersecurity is a complex subject. 0:02Millions of moving parts, expanding attack surfaces, tons of technologies to learn, and creative attackers constantly changing their tactics and targets. 0:11In this video, I'm gonna try to simplify the story and strip it all down to the fundamentals. 0:16Along the way, we're gonna discuss what needs to be done, how we're going to do it, who needs to do, and when. 0:25So settle in class, 0:26this is Cybersecurity 101 0:28and we're gonna learn about the three acronyms to rule them all. 0:32The first of the three acronyms I'm gonna introduce you to is gonna answer the what. 0:37What do we do in cybersecurity? 0:39And I'm going to suggest to you everything we do and cybersecurity is about this. 0:44It's about CIA. 0:46No, not the spy guys. 0:49It's something we call the CIA triad where we've got confidentiality. 0:55That's basically keeping secrets secret. 0:58Making information that's sensitive, only available to the people that are authorized to see it. 1:03That's our first goal with CIA. 1:05The second is integrity. 1:07And in this case, we wanna make sure that the data hasn't been tampered with, that it's still reliable. 1:13And then the last part of the CIA triad is availability. 1:18Availability is trying to guard against denial of service attacks, 1:21where an attacker is trying to take the system down, make it unavailable for everyone else. 1:26So the first thing to remember: what we're doing in cybersecurity is all about CIA, confidentiality, integrity, and availability. 1:35So now we know what we need to do. 1:37How are we going to go about doing it? 1:40Well, the acronym in this case to remember is PDR. 1:45It's prevention, detection, and response. 1:49And in everything that we're doing in cyber security in order to achieve the CIA, we're doing it through these kinds of methods. 1:57So for instance, there are technologies that will help us with prevention. 2:00For instance, cryptography will help us to make something so that not everyone can see it, as an example. 2:08Multi-factor authentication is another example so that I can verify it's really you before I give you access to the information and decrypt it and let you read it. 2:18Roles-based access control is another way of doing more fine-grained control to say what kinds of things you're allowed to do and not. 2:26So these are a lot of prevention technologies. 2:28What kind of things can we do in the detection? 2:31Well, we can do logging, 2:33so that way we keep a list of all the activities that someone has done. 2:37We can monitor what's happening on the system so that we can tell if they do something that's incorrect. 2:44One of the technologies that we use here is a security information and event management system, SIEM. 2:51And then lastly, there's response. 2:53So we've done the prevention. We've done the detection. 2:55That's if all the prevention didn't work, Then we need to detect and find out what didn't work. 3:01Now we have to respond. 3:02And in this case, the traditional term was incident response. 3:12Now a more common term these days is SOAR, which is security, orchestration, automation, and response. 3:13So think about these two aspects, orchestration and automation. 3:18I want to automate as much of this as I possibly can. 3:21But I can't automate everything because in some cases this is the first time we've ever seen it. 3:26So in those cases, I'm gonna orchestrate a response. 3:29But I do some sort of technological advance that's gonna make it easier for us to do this response. 3:36All right, the third acronym that we have to keep in mind in Cybersecurity 101 is 3:41PPT and what I mean by this is people, process, and technology. 3:49Now, in this case, I'm a technologist, so I tend to think in terms of the tech 3:53and I feel like that can solve most of the problems. 3:56And it can solve a lot of problems. 3:58I just gave you an example of how technology is used in the prevention, detection, and response. 4:03But that's not nearly enough, because tools alone will not solve the problems. 4:09We still have to have people involved in all of this, and they need to be trained.They need to know how to operate. 4:15They need know how guide the system and guide the steps through all of this process. 4:19They need decide after all what prevention technologies we're going to use, 4:24what kind of detection schemes we'll do, and then ultimately make the decisions when we do responses. 4:30So those people will also interface with process. 4:34So we've got to have some sort of process, technology...these kinds of things that will guide the actions of those people. 4:43And then those processes and policies and procedures will ultimately be the things that we implement in the technology. 4:52So people, process, and technology. 4:55Okay, so there you go. 4:56Three acronyms to rule them all, just as I promised. 5:00CIA (confidentiality, integrity, and availability) is the what. 5:04PDR (prevention, detection, and response) is the how? 5:07And PPT (people, processes, and technologies) is the who? 5:11Now how about when do you have to be able to do all of this? 5:16Well, the answer is pretty simple. 5:18It's 24-7. 5:20Because you have be right all the time. 5:23The bad guys only have to right once. 5:25They don't sleep, therefore you can't be caught napping.