The CIA Triad of IT Security

Alexander Oni
A free video tutorial from Alexander Oni
Best Selling Instructor, 100,000 + Students
4.6 instructor rating • 23 courses • 107,884 students

Learn more from the full course

The Absolute Beginners Guide to Cyber Security 2021 - Part 1

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more

03:43:16 of on-demand video • Updated March 2021

  • Understand the basic concepts and terminologies used in the information and cyber security fields
  • Take up entry roles for IT and Cybersecurity Positions
  • Differentiate between the various forms of malware and how they affect computers and networks
  • Understand how hackers actually hack
English [Auto] Let's talk about the CIA try it. And no I am not referring to the Central Intelligence Agency I am referring to a model that is designed to guide every information security policy all cyber security policy of an organization. So we find every security policy you have three core fundamental parts which makes up the CIA a try and so what exactly is the CIA trade. Well the C stands for confidentiality stands for integrity and the A stands for ival ability. So what exactly do these three things mean. Well first off we have confidentiality. This limits access to information and makes sure that only people with the light clearance have access to that information. And as such it also ensures privacy. It makes sure that data is kept safe and secure from the general public. Only people with the right access would be able to view certain information or data. That's all confidentiality is all about. And there are several methods by which we can achieve this. We have encryption which we'll talk about later. We have biometrics which would involve things like fingerprint scans. I scans voice Sam plain and so on and so forth. We also have passwords of course probably the most popular confidentiality method out there. And we also have security tokens as well. Next up is integrity and this ensures that data that has been sent from one point lives at its destination without any alteration. It makes sure that data remains consistent and actuates it makes sure that data has not been tampered with in any way. And there are different methods by which we can achieve this we have the use of user access controls and we also have checksums which we'll talk about later as well. And finally we have either lability which ensures that data is available at all times whenever people need to walk on data. It is right there waiting for them and there are different methods of achieving this. We have backups we have Hobden maintenance and repairs and we also have disaster recovery as well which we'll talk about later as well. So to summarize well confidentiality would involve sets of rules that limit access to information that's basically all what confidentiality is all about integrity. On the other hand is the Shoguns that information has not been compromised. It's not been altered. It remains pure and unaffected. And finally availability is a guarantee of reliable access to information by authorized people by people with the necessary clearance. So these three together may cost the CIA a triad and it is the backbone of every information security policy or cybersecurity policy of an organization.