Foundations · Module 5

CIA and simple attacks

CIA is a simple lens I use to explain what went wrong and what to fix first.

55 min 3 outcomes Cybersecurity Foundations

Previously

Networks, transport, and what leaks

Networks move data in pieces, not in one blob.

This module

CIA and simple attacks

CIA is a simple lens I use to explain what went wrong and what to fix first.

Next

Identity and access

Identity is where most real world attacks start because stolen access is cheaper than breaking encryption.

Progress

Mark this module complete when you can explain it without rereading every paragraph.

Why this matters

Once you can name the impact clearly, choosing controls becomes calmer and more defensible.

What you will be able to do

  • 1 Explain confidentiality, integrity, and availability as impact, not buzzwords
  • 2 Spot which part of CIA a scenario is breaking
  • 3 Explain why passwords and links are common starting points for attacks

Before you begin

  • No previous technical background required
  • Read the section explanation before using tools

Common ways people get this wrong

  • Overfocus on confidentiality. Teams encrypt data and forget integrity and availability. Incidents still happen.
  • No evidence trail. If you cannot detect misuse, you cannot respond in time.

CIA is a simple lens I use to explain what went wrong and what to fix first. Once you can name the impact clearly, choosing controls becomes calmer and more defensible.

To keep this practical, we will use one simple frame. Confidentiality, integrity, and availability are often shortened to CIA. Confidentiality means only the right people can see information. Integrity means changes are correct and visible. Availability means systems are there when needed. The purpose is not to memorise three words. The purpose is to ask better questions.

In plain language, confidentiality is about privacy, integrity is about truth, and availability is about being able to function. Most incidents are one of these three, usually with a second one following close behind.

When identity is weak, confidentiality fails. When changes are untracked, integrity fails. When backups are missing, availability fails. Good governance makes those failures less likely because it makes the decisions explicit and reviewed.

In real organisations, CIA is how you explain impact to non security people. A leader might not care about a vulnerability ID, but they do care about "patients could not be seen" or "invoices were changed" or "private data leaked." CIA translates technical failures into outcomes.

Everyday example. Confidentiality is your bank statement being private, integrity is your balance being correct, and availability is being able to pay for groceries when you are at the checkout.

Common mistake. Thinking CIA is a checklist where you must maximise all three at once. In practice you trade. Tight security might reduce availability if you lock out staff too often. High availability might reduce confidentiality if you spread access too widely. The job is to choose wisely and explain the trade.

Why it matters. CIA is a simple way to reason about controls and to spot what kind of harm you are actually preventing. It helps you avoid security theatre and focus on outcomes.

Entropy Payload

Mental model

CIA applied to systems

Confidentiality, integrity, and availability fail in different places. Controls must match the failure.

  1. 1

    Which property is at risk

  2. 2

    Confidentiality

  3. 3

    Integrity

  4. 4

    Availability

Assumptions to keep in mind

  • CIA is a lens, not a slogan. Use it to ask what breaks and who is harmed. Do not use it as decoration.
  • Availability is a safety issue. For many services, downtime is harm. Treat availability as a real security objective.

Failure modes to notice

  • Overfocus on confidentiality. Teams encrypt data and forget integrity and availability. Incidents still happen.
  • No evidence trail. If you cannot detect misuse, you cannot respond in time.

Key terms

Entropy
A measure of unpredictability. More entropy means harder to guess secrets like passwords.
Payload
The main content inside a packet or message.

Check yourself

Core ideas quiz. CIA in practice

0 of 8 opened

What is confidentiality

Keeping data visible only to the right people or systems.

What is integrity

Keeping data and systems from being changed silently or incorrectly.

What is availability

Keeping systems usable when people need them.

Give one example of an integrity failure

Altering a bank balance or invoice without detection.

Why are weak passwords a problem

They make it easy to guess access and break confidentiality.

How can a fake link hurt you

It can steal credentials or deliver malware when clicked.

Why is trust a decision

Because each control should be tied to an explicit assumption about who or what is allowed.

How does availability relate to incidents

If systems go down at the wrong time, it causes harm even if data was protected.

Artefact and reflection

Artefact

A short note mapping one realistic incident to CIA, with one prevention and one detection idea

Reflection

Where in your work would explain confidentiality, integrity, and availability as impact, not buzzwords change a decision, and what evidence would make you trust that change?

Optional practice

Type a pretend password and see feedback about length, variety and guessability. No real passwords are stored. This is a safe, local practice tool.

Also in this module

CIA trade off explorer

Pick everyday situations and choose options that trade off confidentiality, integrity and availability. See short explanations after each choice.

Source NIST Cybersecurity Framework (CSF) 2.0 (2024)
Source OWASP Top 10 (2025)
Source OWASP ASVS 5.0.0
Source ISO/IEC 27001:2022 Information security management systems