The CIA Triad

The CIA Triad is the foundational framework of information security. Every security decision you make — every control you implement, every risk you assess — connects back to one or more of these three properties: Confidentiality, Integrity, and Availability.

Confidentiality

Confidentiality is about ensuring that information is accessible only to those who are authorized to see it. It protects data from unauthorized disclosure. The security professional's job is to regulate access — permitting authorized users in, keeping everyone else out.

Two categories of data that require special confidentiality protection:

Sensitivity refers to the importance assigned to information by its owner — how much harm would result if that information were improperly disclosed or modified.

Common threats to confidentiality and their countermeasures:

Integrity

Integrity means that information is accurate, complete, and has not been altered in an unauthorized way. It applies to data at rest, data in transit, and data being processed.

A key concept: the baseline — a documented snapshot of the known good state of a system or dataset. If you compare the current state to the baseline and they match, integrity is intact.

Common threats to integrity:

Availability

Availability means that systems and data are accessible when authorized users need them. It is not about 100% uptime — it means systems meet the organization's actual business requirements for timely and reliable access.

Common threats to availability:

Authentication, Authorization, and Accounting (AAA)

Access control follows three sequential steps:

  1. Identification — Making a claim of identity. Typically your username.
  2. Authentication — Proving that claim. Three categories:
    • Something you know: Passwords, PINs, security questions
    • Something you have: Hardware tokens, smart cards, one-time passwords
    • Something you are: Biometrics — fingerprints, facial recognition, iris scans
  3. Authorization — Determining what the authenticated user is allowed to do. Enforced through Access Control Lists (ACLs) or role assignments.

Accounting — Maintaining logs of what users do once granted access. This enables auditing and forensic analysis.

SFA vs MFA

Single-Factor Authentication uses only one method. Multi-Factor Authentication requires two or more from different categories. A username and password together still count as single-factor — both are "something you know."

Non-Repudiation

Non-repudiation is the inability of a party to deny having performed an action. In a legal context, it means you cannot claim you didn't send an email you sent or approve a transaction you approved. This becomes critical in e-commerce and electronic transactions. Digital signatures are the primary non-repudiation mechanism — they hold parties accountable for their actions.

Privacy

Privacy is the right of an individual to control the distribution of information about themselves. It is distinct from security: security protects data from unauthorized access, while privacy governs how data is collected, used, and shared even by authorized parties.

Risk Management

Risk is the measure of the extent to which an entity is threatened by a potential event. Risk = Likelihood × Impact

Key terminology:

Risk Assessment Matrix

Risk Treatment Options

Risk tolerance is the level of risk an organization is willing to accept in pursuit of its goals. Set by executive management and the Board of Directors.

Security Controls

Security controls are the safeguards put in place to protect the CIA Triad. Three types:

Controls work in combination.

A badge reader (physical) connected to a door lock (physical) managed by an access control system (technical) governed by a security policy (administrative) — this layering is what defense in depth looks like in practice.

Governance Elements

The governance hierarchy from broadest to most specific:

(ISC)² Code of Ethics

All (ISC)² certified professionals commit to these four canons, in priority order:

  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure
  2. Act honorably, honestly, justly, responsibly, and legally
  3. Provide diligent and competent service to principals
  4. Advance and protect the profession

Key Terms for the Exam

Term
Definition
Confidentiality
Protecting information from unauthorized disclosure
Integrity
Ensuring data has not been altered without authorization
Availability
Ensuring authorized users can access data when needed
Authentication
Proving identity
Authorization
Determining what an authenticated user may do
Non-repudiation
Preventing denial of an action that was performed
PII
Personally Identifiable Information
PHI
Protected Health Information
Risk
Likelihood × Impact of a potential adverse event
Vulnerability
A weakness that could be exploited
Threat
Something that can exploit a vulnerability
Risk Mitigation
Taking action to reduce likelihood or impact
Risk Transference
Shifting financial risk to another party (insurance)
Governance
The system by which an organization is directed and controlled