What is CIA triad? Explained by security expert

What is CIA triad ❓

The CIA triad is a fundamental security concept. CIA Stands for Confidentiality, Integrity, Availability.

Let me break down what is CIA triad is in simple words.

The whole principle is to avoid Theft, Tampering and Disruption of the systems through CIA Triad (Confidentiality, Integrity and Availability).

CIA triad

Are there only three Fundamental security concept

Well, The answer is No. There are many fundamental security concepts but only five of them are important and currently approved by the ec-council.

So, The five fundamental security concepts are;

  1. Confidentiality
  2. Integrity
  3. Availability
  4. Authenticity
  5. Non-Repudiation

So, The next time if someone asks you how many fundamental security concepts are there?

Say there are many fundamental security concepts but only five of them are approved by the ec-council.

Why CIA triad is Important ????

The CIA triad and authenticity, non-repudiation are the fundamental security concepts. This basic security concept ensures the data to be safe.

Defining and Explanation of CIA triad

Confidentiality: Keeping systems and data from being accessed, seen, read to anyone who is not authorized to do so. Information is accessible only to authorized personnel.

Integrity: TRUSTWORTHINESS OF DATA OR RESOURCES

Protect the data from modification or deletion by unauthorized parties, and ensure that when authorized people make changes that shouldn’t have been made the damage can be undone.

Availability: ACCESSIBLE WHEN REQUIRED BY AUTHORIZED USERS

Systems, access channels, and authentication mechanisms must all be working properly for the information they provide and protect to be available when needed.

Authenticity: Refers to the characteristics of communication, document, or any data that ensures the quality of being genuine.

Non-Repudiation: Non-repudiation is the assurance that someone cannot deny the validity of something.

Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data.

Also Read: Password cracking using ophcrack is damn easy