Foundations · Module 5
CIA and simple attacks
CIA is a simple lens I use to explain what went wrong and what to fix first.
Previously
Networks, transport, and what leaks
Networks move data in pieces, not in one blob.
This module
CIA and simple attacks
CIA is a simple lens I use to explain what went wrong and what to fix first.
Next
Identity and access
Identity is where most real world attacks start because stolen access is cheaper than breaking encryption.
Progress
Mark this module complete when you can explain it without rereading every paragraph.
Why this matters
Once you can name the impact clearly, choosing controls becomes calmer and more defensible.
What you will be able to do
- 1 Explain confidentiality, integrity, and availability as impact, not buzzwords
- 2 Spot which part of CIA a scenario is breaking
- 3 Explain why passwords and links are common starting points for attacks
Before you begin
- No previous technical background required
- Read the section explanation before using tools
Common ways people get this wrong
- Overfocus on confidentiality. Teams encrypt data and forget integrity and availability. Incidents still happen.
- No evidence trail. If you cannot detect misuse, you cannot respond in time.
CIA is a simple lens I use to explain what went wrong and what to fix first. Once you can name the impact clearly, choosing controls becomes calmer and more defensible.
To keep this practical, we will use one simple frame. Confidentiality, integrity, and availability are often shortened to CIA. Confidentiality means only the right people can see information. Integrity means changes are correct and visible. Availability means systems are there when needed. The purpose is not to memorise three words. The purpose is to ask better questions.
In plain language, confidentiality is about privacy, integrity is about truth, and availability is about being able to function. Most incidents are one of these three, usually with a second one following close behind.
When identity is weak, confidentiality fails. When changes are untracked, integrity fails. When backups are missing, availability fails. Good governance makes those failures less likely because it makes the decisions explicit and reviewed.
In real organisations, CIA is how you explain impact to non security people. A leader might not care about a vulnerability ID, but they do care about "patients could not be seen" or "invoices were changed" or "private data leaked." CIA translates technical failures into outcomes.
Everyday example. Confidentiality is your bank statement being private, integrity is your balance being correct, and availability is being able to pay for groceries when you are at the checkout.
Common mistake. Thinking CIA is a checklist where you must maximise all three at once. In practice you trade. Tight security might reduce availability if you lock out staff too often. High availability might reduce confidentiality if you spread access too widely. The job is to choose wisely and explain the trade.
Why it matters. CIA is a simple way to reason about controls and to spot what kind of harm you are actually preventing. It helps you avoid security theatre and focus on outcomes.
Entropy Payload
Mental model
CIA applied to systems
Confidentiality, integrity, and availability fail in different places. Controls must match the failure.
-
1
Which property is at risk
-
2
Confidentiality
-
3
Integrity
-
4
Availability
Assumptions to keep in mind
- CIA is a lens, not a slogan. Use it to ask what breaks and who is harmed. Do not use it as decoration.
- Availability is a safety issue. For many services, downtime is harm. Treat availability as a real security objective.
Failure modes to notice
- Overfocus on confidentiality. Teams encrypt data and forget integrity and availability. Incidents still happen.
- No evidence trail. If you cannot detect misuse, you cannot respond in time.
Key terms
- Entropy
- A measure of unpredictability. More entropy means harder to guess secrets like passwords.
- Payload
- The main content inside a packet or message.
Check yourself
Core ideas quiz. CIA in practice
0 of 8 opened
What is confidentiality
Keeping data visible only to the right people or systems.
What is integrity
Keeping data and systems from being changed silently or incorrectly.
What is availability
Keeping systems usable when people need them.
Give one example of an integrity failure
Altering a bank balance or invoice without detection.
Why are weak passwords a problem
They make it easy to guess access and break confidentiality.
How can a fake link hurt you
It can steal credentials or deliver malware when clicked.
Why is trust a decision
Because each control should be tied to an explicit assumption about who or what is allowed.
How does availability relate to incidents
If systems go down at the wrong time, it causes harm even if data was protected.
Artefact and reflection
Artefact
A short note mapping one realistic incident to CIA, with one prevention and one detection idea
Reflection
Where in your work would explain confidentiality, integrity, and availability as impact, not buzzwords change a decision, and what evidence would make you trust that change?
Optional practice
Type a pretend password and see feedback about length, variety and guessability. No real passwords are stored. This is a safe, local practice tool.
Also in this module
CIA trade off explorer
Pick everyday situations and choose options that trade off confidentiality, integrity and availability. See short explanations after each choice.