The CIA Triad (Not spies — it’s a cybersecurity model)
Confidentiality
Confidentiality ensures that sensitive information is only accessible to authorized users. It's about keeping secrets safe.
This is primarily achieved through two methods:
Access Control: This involves a two-step process:
Authentication: Verifies that a user is who they claim to be (e.g., using a password, fingerprint, or Multi-Factor Authentication).
Authorization: Checks if the authenticated user has the necessary permissions to access a specific resource (e.g., a manager can access payroll data, but an intern cannot).
Encryption: This scrambles data so that it's unreadable to anyone without a special key. Even if an unauthorized person intercepts the data, all they'll see is a meaningless jumble of characters. This is often done using a shared, private key (Symmetric Encryption), where both the sender and receiver have the same key to lock and unlock the message.
Example: Like locking your diary and only giving the key to your best friend.
Integrity
Integrity guarantees that data has not been altered or tampered with. It's about ensuring data is trustworthy and "true to itself."
Integrity is maintained using cryptographic functions that can detect any changes to data.
Digital Signatures and Message Authentication Codes (MACs): These technologies create a unique digital "fingerprint" for a message or data. If even a single character is changed, the fingerprint will no longer match, instantly alerting the system that the data has been compromised.
Immutable Ledgers (e.g., Blockchains): Some systems, like blockchains, are designed so that once data is added, it cannot be changed or deleted. Any attempt to modify a record will be flagged and rejected by the system, ensuring the history of the data remains intact.
Example: Like sealing an envelope — if the seal is broken, you know someone tampered with it.
Availability
Availability ensures that systems and data are accessible to authorized users whenever they need them. It's about keeping services up and running.
The main threats to availability are Denial of Service (DoS) attacks, which aim to make a system unusable.
Denial of Service (DoS): A single attacker overwhelms a server with so much traffic or so many requests that it can no longer respond to legitimate users.
Distributed Denial of Service (DDoS): This is a more powerful version of a DoS attack. An attacker controls a network of compromised computers (a botnet) and commands them all to flood a target server at the same time. The sheer volume of traffic makes the server crash or become unresponsive.
SYN Flood: A specific type of DoS attack that exploits a normal network process (the TCP three-way handshake). The attacker sends a request to a server, which reserves resources for the connection, but never completes the handshake. By repeating this process thousands of times, the attacker can use up all the server's resources, preventing any new, legitimate connections.
Example: Like making sure the store doors are open for customers — and not blocked by pranksters piling shopping carts in the entrance.
CIA Checklist for any IT project:
-
Confidentiality: Can only the right people access sensitive info?
-
Integrity: Will I know if the data changes unexpectedly?
-
Availability: Will the system work for legitimate users when needed?