Learning Library

← Back to Library

Understanding the CIA Triad

Key Points

  • The CIA triad in cybersecurity stands for confidentiality, integrity, and availability, forming the foundational framework for protecting information systems.
  • Confidentiality ensures that only authorized users can access specific data, typically enforced through authentication, authorization, multi‑factor authentication, and encryption, while blocking unauthorized access.
  • Integrity guarantees that data remains accurate and untampered, with mechanisms to detect and alert on modifications such as altered records or log‑file forgery.
  • Availability focuses on delivering resources to legitimate users when needed, and is threatened by attacks like denial‑of‑service that flood systems and disrupt access.

Full Transcript

# Understanding the CIA Triad **Source:** [https://www.youtube.com/watch?v=kPPFNrlN3zo](https://www.youtube.com/watch?v=kPPFNrlN3zo) **Duration:** 00:04:02 ## Summary - The CIA triad in cybersecurity stands for confidentiality, integrity, and availability, forming the foundational framework for protecting information systems. - Confidentiality ensures that only authorized users can access specific data, typically enforced through authentication, authorization, multi‑factor authentication, and encryption, while blocking unauthorized access. - Integrity guarantees that data remains accurate and untampered, with mechanisms to detect and alert on modifications such as altered records or log‑file forgery. - Availability focuses on delivering resources to legitimate users when needed, and is threatened by attacks like denial‑of‑service that flood systems and disrupt access. ## Sections - [00:00:00](https://www.youtube.com/watch?v=kPPFNrlN3zo&t=0s) **CIA Triad Explained: Confidentiality** - The speaker introduces the CIA security model, focusing on confidentiality as ensuring only authorized users can access data through mechanisms like authentication, authorization, and encryption, while contrasting it with unauthorized access and noting modern privacy considerations. - [00:03:26](https://www.youtube.com/watch?v=kPPFNrlN3zo&t=206s) **Applying the CIA Triad** - The speaker explains denial‑of‑service attacks and advises checking every security project against confidentiality, integrity, and availability to ensure comprehensive protection. ## Full Transcript
0:00When you think cyber security, you 0:02should think CIA. No, not those spy 0:05guys. A different kind of CIA. What I 0:08mean is confidentiality, 0:12integrity, 0:13and availability. 0:17These three things make up something 0:20that we call the CIA triad. And let's 0:23talk about those ideas in a little more 0:25detail. So, first of all, 0:26confidentiality. That's the idea that 0:29says only an authorized user should be 0:31able to see particular information or 0:33access particular resources. So in order 0:36to do that, let's take an example where 0:38we've got let's say this guy is an 0:40authorized user and he wants to be able 0:42to read this particular data. So what 0:45would we do? Well, we'd probably put in 0:47place some sort of security system, some 0:50sort of authentication, authorization, 0:53multiffactor authentication, uh some 0:55sort of encryption capability so that 0:57when he goes to access this, he is given 1:01access and gets it. But on the other 1:04hand, if we have an unauthorized user 1:07who wants to do the same thing, they try 1:09to get into the system and they are 1:11blocked. So that's really what 1:13confidentiality is about. It's a very 1:15simple concept. It's a lot harder to 1:17implement. A lot of times, if you look 1:19at the literature, it will refer to 1:20confidentiality as the same as privacy. 1:23But I'll say that's kind of based on an 1:25older notion of what privacy is. Now, we 1:27have a more modern notion that says 1:29confidentiality really involves more 1:31things like notice and consent and the 1:34right to be forgotten and things like 1:37that. that's not really covered in this 1:39overall notion of confidentiality, but 1:42it is still very important. So, 1:45confidentiality, the first of the CIA 1:47triad. How about next? Integrity. Well, 1:50integrity basically means that if I 1:54place an order for, let's say, a 100 1:56widgets that someone can't come along 1:59later and turn that into a 100,000 2:02widgets or a million or change the 2:06number entirely or delete the record 2:08entirely. In other words, the 2:11information is trustworthy. It is true 2:14to itself is another way to think of it. 2:16So with integrity technologies, what we 2:18do is we're looking for tampering and 2:21we're detecting that and then alerting 2:23someone so that they know that this data 2:25is no longer trustworthy. A bad guy, for 2:28instance, might try to come into a 2:30system after he's hacked it and change 2:32the log file to remove any record that 2:34he was there in the first place. That 2:36would be an integrity attack. So we need 2:38security capabilities to ensure that the 2:41system is still true to itself. And then 2:43the last part of the CIA triad is 2:46availability. In this case, it's about 2:49making sure that authorized users have 2:51access to the resources that they need 2:54when they need them. So for instance, we 2:56have authorized user here and they want 3:00to access a particular server. So when 3:03they come, they get access as they 3:05expect. However, we could end up with a 3:09case where we have a malicious actor who 3:12comes in and floods this system with too 3:15much traffic, therefore taking it down, 3:18making it not available. We refer to 3:20this as as a denial of service attack. 3:24And a denial of service attack can take 3:26a lot of different forms, but that's the 3:27basic idea is that a bad guy is 3:30preventing a good guy from getting 3:31access to the system. So, when it comes 3:34down to security, again, think CIA, not 3:38the spy guys, but the CIA triad, and use 3:41that as a checklist. Whenever you come 3:43up with a new security project, go back 3:46over the the different uh angles of the 3:48CIA triad and say, did I cover 3:51confidentiality? Did I cover integrity 3:53attacks? Did I cover availability? And 3:56if I've got all of those things covered, 3:58then it's job finished.