The CIA Triad of IT Security

A free video tutorial from Alexander Oni
Best Selling Instructor, 100,000 + Students
Rating: 4.6 out of 5Instructor rating
21 courses
163,689 students
The Trinity of IT Security - CIA

Learn more from the full course

The Absolute Beginners Guide to Cyber Security 2022 - Part 1

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more

04:09:14 of on-demand video • Updated September 2022

Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand how hackers actually hack
English [Auto]
Let's talk about the fundamental pillars of cybersecurity and cybercrime in general. And I'm talking about the CIA and the D. A. D. Triads. Now, what exactly is CIA? Nope. It is not the Central Intelligence Agency. It is confidentiality, integrity and availability. These are the three fundamental pillars of cyber security. It doesn't matter what your job in cybersecurity is, it doesn't matter what tool. But talking about what software are talking about anything involving cybersecurity will fall at least under one of these three categories. But what exactly are they? Confidentiality. Basically, we're talking about scenarios where data or resources are accessed by only those that have the right permissions. So in this case right now, we'll talk about technologies like encryption, passwords, biometrics, you know, multiple factor authentication, two factor applications generally anything that ensures that data is accessed by only those that have the right access to it. That's what we call confidentiality. But we also have integrity where data has not been tampered or altered in any way. We're talking about things like hashing, which we will talk quite a lot about in this course and then check sums. And then finally we have availability. Basically data and resources are available to be accessed or shared. We're talking about network access, server access, data availability and so on. So once again, confidentiality, integrity, availability. These are the three fundamental pillars of cyber security. But then we have the dark side D, a D, which is basically the exact opposite of CIA. So rather than having confidentiality, we have disclosure. Rather than having integrity, we have alteration. And rather than having authenticity, we have I'm sorry, because rather than having availability, we have deniability. Every cybercrime or hacker, anything against cybersecurity will fall under one of these three pillars. So the disclosure basically data is accessed by non authorized users. You have things like Trojans, brute force attacks, even theft. Yes, physical theft of computers, memory cards, data, disks and so on. All that falls under disclosure. You have alteration. Data has been compromised or tampered with again, malware involved viruses, SQL injection attacks and so on. And of course, finally, we have deniability where access to data and resources are blocked. And this comes under things like a denial of service, attack, ransomware and so on. So once again, in your journey as a cybersecurity professional, you are going to be involved in the CIA triad fighting against those in the d a d triad. Welcome to cybersecurity.