Skip to course content

Cybersecurity module

Confidentiality, integrity, availability, and simple attacks

Without a clear harm model, teams mix up privacy loss, corruption, and outage, then choose controls that solve the wrong problem.

  • Foundations
  • 16 min
  • 2 outcomes

Optional progress

Record completion if you need it

What changes after this module

Use the CIA model to reason about what kind of harm an attack creates instead of treating all attacks as one category.

Outcome promise

  • Explain the CIA model using everyday service examples.
  • Identify which part of the model a simple attack is mainly affecting.

Core model

Use the diagram and terms below as the minimum model you should be able to explain after this module. If you cannot explain the model in plain language, pause here before you move on.

Confidentiality, integrity, availability, and simple attacks
A single visual model so the concept stays connected to a real decision.
Asset oroutcomeThreat orfailure pathControl orresponseMeasure andimproveharmreducereviewretest risk

Key terms

Confidentiality
Keeping information away from unauthorised access or disclosure.
Availability
Keeping systems and information usable when needed.

Check yourself

Answer the prompt before you reveal the check. If you cannot answer it in your own words, revisit the model and the terms once more.

Quick check

Why is a denial of service issue different from a data leak even when both are serious?

Reveal the answer check

Because the main harm is different. One primarily damages availability, while the other primarily damages confidentiality and trust.

Reflection and evidence

Keep the evidence small. One honest reflection and one small artefact is enough to show that the learning changed how you describe, check, or design something.

Reflection prompt

Describe one event you know. Which part of the CIA model was most affected, and what evidence tells you that?

Artefact

A short CIA classification note for one real or plausible incident.

Optional deeper practice

Open the workspace and classify a few events by whether they mainly affect confidentiality, integrity, or availability.

Move through the course

Keep the flow predictable. Stay with the stage sequence unless you have a clear reason to jump around.