Understanding the CIA Triad in 2022

Share this

A question I commonly see when individuals are trying to break into the Cybersecurity industry is: What do I need to understand to be successful and make it?

My response has always been to start at the CIA Triad (also referred to as the CIA Triad Principles). The Triad is a strong fundamental approach on how we handle and protect data, systems or other valuable assets. The CIA Triad stands for Confidentiality, Integrity and Availability. Think of it as part of an equilateral triangle where all sides are equal and no one principle is more important than the other. It only takes one side to fall in order for the contents inside the triangle to be exploited.

As you progress in your cybersecurity journey, you will often refer back to these principles to determine how an asset can be better protected or risk better mitigated. Let’s dive in further into the CIA Triad security model.

Confidentiality

Confidentiality (privacy) is assuring the correct person(s) have access to the material or data while it is in-transit, at-rest or processing. This can be achieved by a variety of primary controls including: Two-Factor/Multifactor Authentication (2FA/MFA), Encryption, Access Controls, Classification, Watermarking and more.

What are the threats to Confidentiality?

Things that threatened confidentiality include (but are not limited to): Human Error, Weak Passwords, Lack of Strong Encryptions. Eavesdropping (including Dumpster Diving) and Insider Threats.

Integrity

Integrity is assuring that the data or systems cannot be altered or destroy by unauthorized person(s). This can be achieved by a variety of primary controls including (but not limited to): Hashing, Auditing, Setting File Permissions, Backups and Message Digests.

What are the threats to Integrity?

Things that threatened Integrity include (but are not limited to): Data Diddling, Human Error, Vulnerable Software, Insider Threat and Ransomware.

Availability

Availability is assuring that the data can be accessed by authorized person(s) whenever requested. This can be achieved by a variety of primary controls including (but not limited to): Firewalls, Load Balancers, Uninterruptable Power Supplies (UPS), Business Continuity Plan and Disaster Recovery Plan (BCP/DR) and Backups.

What are the threats to Availability?

Things that threatened Availability include (but are not limited to): Human Error, Default Passwords (on security appliances), Power Outages, Natural Disasters, Ransomware and Insider Threats.

Below is a more in-depth video of the CIA Triad. It will cover things in greater depth as well as a few extra tips that are not outlined on this blog.

EXAM TIP: When studying, I find it useful to approach question sets by asking yourself where it lies on the CIA Triad. This will give you a strong hint as to what answer you should be looking for. For instance, if the question is talking about DDOS mitigations, the question is likely referencing Availability. You want to make sure the responses line up with ensuring the information is available when it needs to be (i.e. Load Balancers, Firewalls, Backups). It wouldn’t make much sense to apply a Confidentiality control like watermarking to ensure Service Level Agreements (SLA).

Be sure to have a firm grasp on the CIA Triad and if you have any questions or suggestions, please feel free to reach out to me.


To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.
Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Maximizing Email Security: Understanding the Importance of DKIM, SPF, and DMARC

Email is a crucial part of our daily lives, but unfortunately, it’s also a popular target for cybercriminals who use various tactics like spam, phishing, and spoofing to scam people. The FTC recently issued a warning to users of MetaMask and PayPal about phishing scams that are currently circulating through fake emails. The scam claims that the user’s cryptocurrency wallet has been blocked and encourages them to click a link and update their wallet to prevent the loss of their crypto. To protect email users from these threats, authentication protocols like DKIM, SPF, and DMARC are strongly recommended.

Top 10 Cybersecurity Job Sites

Top 10 Job Sites for Cybersecurity Professionals

As the world continues to rely heavily on technology, the demand for cybersecurity professionals continues to grow. Cybersecurity jobs offer high salaries, job security, and a wide range of career options. However, finding the right job can be challenging.

Investigating the FAA Outage: Separating Fact from Fiction

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system.

Failing Exams: How to Turn Failure into an Opportunity for Growth

One of the most valuable lessons I have learned is that failing an exam is not the end of the world. In fact, it can be a crucial step in the learning process. When we fail, it forces us to take a step back and assess what went wrong.

What Is Symmetric Encryption? [VIDEO]

Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….

Sage Knows IT: CompTIA Sec+ Study Group

CompTIA Security+ sy0-601 Study Group- Session 1

Session 1 of our CompTIA Study Group. If you are interested in joining the study group, subscribe on YouTube. To support this blog, this post may contain…