CIA Triad

Definition

What is the CIA Triad?

The CIA Triad is a fundamental concept in cyber security that represents Confidentiality, Integrity, and Availability. It is used to define the goals of cybersecurity policies and procedures and to help ensure the security of digital assets and information.

Confidentiality refers to the protection of sensitive information from unauthorized access, use, or disclosure. This includes safeguarding data from theft, espionage, or other forms of unauthorized access. Confidentiality is achieved through the use of encryption, access controls, and other security measures.

Integrity refers to the accuracy, completeness, and consistency of data and information. It ensures that data has not been altered by unauthorized users and that it remains reliable and accurate. Integrity is maintained through the use of various techniques such as File Integrity Monitoring.

Availability refers to the accessibility of information and resources when needed. It ensures that information is available to authorized users when they require it and that critical systems are not disrupted or unavailable due to cyberattacks or other disruptions. Availability is maintained through the use of redundancy, resilience, and rapid response to failures and disaster recovery.

The CIA Triad is a useful framework for thinking about cybersecurity risks when making decisions and developing effective and purpose-driven security strategies.

You may also find interesting​

CISSP

First days as a CISO

You may also find interesting​

CISSP

First days as a CISO

Glossary

Sandbox

A Sandbox is an isolated environment where code or software...

Read More

Hashing

Hashing is a cryptographic process that transforms an input ("message")...

Read More

Antivirus

The traditional Antivirus software is designed to detect, block, and...

Read More

MITRE

MITRE is a not-for-profit organization that operates federally funded research...

Read More

MITRE ATT&CK

MITRE is a not-for-profit organization that operates federally funded research...

Read More