CS CIA Triad

The CIA Triad in Cybersecurity

The CIA Triad is a fundamental framework in information security used to protect data and maintain secure, reliable systems. It acts as a guide for security policies to ensure that information remains confidential, accurate, and accessible only to authorized users.

Why is the CIA Triad Important?

The CIA Triad Confidentiality Integrity Availability

1. Confidentiality

Confidentiality ensures that sensitive data is accessible only to authorized individuals or systems. Its primary purpose is to prevent the unauthorized viewing, access, or misuse of private information.

Risks to Confidentiality

How to Ensure Confidentiality


2. Integrity

Integrity ensures that data remains accurate, authentic, and completely unaltered during storage or transmission. Any unauthorized modification or corruption compromises the reliability of the data.

Risks to Integrity

How Integrity Is Ensured: Hash Functions

A Hash Function detects modifications by generating a unique "fingerprint" (hash value) for a piece of data. Common hash functions include:

Data (Input) Hash Function (e.g., SHA-256) a5b8c9d1...

Note: Even a tiny change in the input (like altering a single word or character) will completely change the resulting hash value, making tampering immediately obvious.

The Working of Hash Functions (Data Verification)

  1. Host A Sends Data: Host A creates a hash value (H1) from the data using a hash function.
  2. Attach Hash: H1 is sent along with the data over the network.
  3. Host B Verifies: Host B receives the data and generates a new hash (H2) from it using the exact same hash function.
  4. Compare:
    • If H1 = H2: The data is exactly as it was sent (integrity preserved).
    • If H1 ≠ H2: The data was altered, corrupted, or tampered with in transit.

3. Availability

Availability ensures that systems, networks, and data are up, running, and accessible to authorized users whenever they are needed. Disruptions to availability can halt operations and cause major losses.

Risks to Availability

How to Ensure Availability

To ensure robust availability, network administrators focus on the following factors:


Exercise

?

Which principle of the CIA Triad is protected when you use a Hash Function to verify a file?