What changes after this module
Use the CIA model to reason about what kind of harm an attack creates instead of treating all attacks as one category.
Outcome promise
- Explain the CIA model using everyday service examples.
- Identify which part of the model a simple attack is mainly affecting.
Core model
Use the diagram and terms below as the minimum model you should be able to explain after this module. If you cannot explain the model in plain language, pause here before you move on.
Key terms
- Confidentiality
- Keeping information away from unauthorised access or disclosure.
- Availability
- Keeping systems and information usable when needed.
Check yourself
Answer the prompt before you reveal the check. If you cannot answer it in your own words, revisit the model and the terms once more.
Quick check
Why is a denial of service issue different from a data leak even when both are serious?
Reveal the answer check
Because the main harm is different. One primarily damages availability, while the other primarily damages confidentiality and trust.
Reflection and evidence
Keep the evidence small. One honest reflection and one small artefact is enough to show that the learning changed how you describe, check, or design something.
Reflection prompt
Describe one event you know. Which part of the CIA model was most affected, and what evidence tells you that?
Artefact
A short CIA classification note for one real or plausible incident.
Optional deeper practice
Open the workspace and classify a few events by whether they mainly affect confidentiality, integrity, or availability.
Move through the course
Keep the flow predictable. Stay with the stage sequence unless you have a clear reason to jump around.