Unit-1 Written Assignment
Unit-1 Written Assignment
Thuta Tun
Introduction
designed to protect data, systems, and networks from cyber threats. One of the foundational
frameworks within cybersecurity is the CIA triad, which stands for Confidentiality, Integrity,
and Availability. These three principles are essential for securing any information system,
helping organizations prevent, detect, and recover from cyberattacks. This paper will explore
the CIA triad, demonstrate how it strengthens an organization’s cybersecurity defenses, and
provide an example of its successful implementation. Lastly, it will argue why the CIA triad
The CIA triad consists of three pillars: Confidentiality, Integrity, and Availability. Each
cybersecurity strategy.
permission to view it. Techniques such as encryption, access control, and authentication
mechanisms are vital in safeguarding sensitive data (Chai, 2021). Without confidentiality,
sensitive data such as financial records or personal identification information (PII) could be
Integrity refers to the accuracy and trustworthiness of data. Ensuring integrity means
that information remains unchanged from its original form, unless properly authorized. This
prevents cybercriminals from altering data to deceive or corrupt processes. Methods like
hashing, checksums, and digital signatures ensure that unauthorized changes can be detected
Availability ensures that authorized users have reliable access to information and
systems, regular data backups, and resilient network infrastructure. A focus on availability
prevents downtime, ensuring that services remain operational even during a cyberattack
(Chai, 2021).
that addresses the key weaknesses that cybercriminals may exploit. Together, these principles
ensure that sensitive information remains protected, unaltered, and available to those who
need it.
A relevant example of how the CIA triad can be effectively implemented to protect an
organization is Capital One’s improved cybersecurity strategy following a major data breach
in 2019. After the breach, Capital One enhanced its security posture by adopting measures
that directly addressed the three core principles of the CIA triad. First, Capital One
financial data. This ensured that sensitive information could only be accessed by authorized
To guarantee data integrity, the company also deployed extensive data validation
financial transactions. Regular audits and hashing were used to confirm that no unauthorized
Lastly, to improve availability, Capital One adopted advanced cloud infrastructure that
offered redundancy and load balancing features, ensuring that customer services would
remain operational even during an attack or system failure. This focus on availability allowed
Capital One to maintain service continuity and avoid costly downtime during future
PAGE \* MERGEFORMAT 1
incidents. By focusing on all three pillars of the CIA triad, Capital One was able to recover
from its previous breach and create a much more resilient system, protecting both its
(Rouse, 2019). These measures ensure that only authorized personnel can access critical data,
In terms of integrity, Cisco utilizes digital signatures and hashing techniques to verify
the authenticity of firmware updates (Rouse, 2019). These methods prevent data from being
altered by attackers, ensuring that the information remains accurate and trustworthy.
redundancy, load balancing, and advanced monitoring tools (Rouse, 2019). These strategies
ensure that services and customer platforms remain accessible even in the event of a
By implementing these measures, Cisco effectively protects its global operations and
Confidentiality, Integrity, and Availability provide the essential framework upon which
security policies and procedures are built. Without adequate focus on confidentiality,
organizations expose themselves to data breaches that can lead to both financial and
PAGE \* MERGEFORMAT 1
changes, which is critical for trust in digital transactions and business processes. Lastly,
availability ensures that systems remain functional, even under attack or during technical
In my view, a proper impplementation of the CIA triad is the cornerstone of any the
robust cyber defense strategy. While advanced technologies like Ai and machine learning are
helpful in threat detection and response, the CIA triad remains the bedrock upon which these
availability weakens the overall defense structure, making even the most technologically
advanced system vulnerable. Therefore, prioritizing the CIA triad is not just a best practice; it
cyber threats.
References
Barker, K. (2015, October 4). The “C.I.A.” security concepts [Video]. YouTube.
https://www.youtube.com/watch?v=432IHWNMqJE
Chai, W. (2021, January). Confidentiality, integrity and availability (CIA triad). TechTarget.
https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA
Knouse, S. (2021, March 2). Capital One’s $80 million data breach fine underscores
https://www.csoonline.com/article/3606198/capital-ones-80-million-data-breach-fine-
underscores-importance-of-cybersecurity.html
https://searchsecurity.techtarget.com/definition/Cisco