Foundation Module: Understanding the CIA Triad
Before we can defend a system or understand how hackers break into one, we must first define what "secure" actually means. In cybersecurity, every defense mechanism, security policy, and risk assessment maps directly back to three core principles known as the CIA Triad.
Select a module below to explore the concepts, view real-world examples, and understand how these principles are attacked and defended.
Keeping secrets secret. Learn about encryption, access controls, and stopping unauthorized access.
Trusting the data. Learn about hashing, digital signatures, and detecting unauthorized changes.
Being there when needed. Learn about redundancy, system resilience, and surviving DoS attacks.
Imagine your personal medical records. You want your doctor to be able to read them (Authorized Access), but you absolutely do not want a random stranger or a malicious hacker to read them (Unauthorized Access). Confidentiality is the set of rules and tools we use to enforce this "need to know" boundary.
In Information System Security, we don't just rely on hiding data. We use specific tools to enforce confidentiality:
A failure of confidentiality is commonly known as a Data Breach. If a hacker exploits a vulnerability to download a database of customer passwords or credit card numbers, the confidentiality of that system has been broken.
Imagine using your mobile banking app to transfer Rp 50,000 to a friend. If a hacker intercepts that transaction over the network and changes the amount to Rp 5,000,000 before it reaches the bank, your data has lost its integrity. We need mathematical proof that a file, message, or transaction is exactly the same as when it was created.
We use cryptographic tools to ensure that if even a single comma is changed in a file, the system knows immediately:
A failure of integrity can be catastrophic. If an attacker injects malicious code into a website (like Cross-Site Scripting or a Trojan Horse), changes financial records, or modifies medical prescriptions, the data can no longer be trusted. Sometimes, losing data integrity is worse than losing confidentiality.
Imagine a hospital's electronic health record system. The data might be perfectly encrypted (Confidentiality) and mathematically verified (Integrity), but if the servers crash during an emergency and doctors cannot access a patient's medical history, lives could be at risk. Protecting availability means keeping the digital doors open.
We build systems with resilience in mind so they can survive hardware failures, natural disasters, and deliberate cyberattacks:
When availability is compromised, business stops. E-commerce sites lose m