The CIA Triad is the foundation of cybersecurity. Every security control is designed to protect one or more of these three principles:
- Confidentiality: Only authorized people can access sensitive data.
- Integrity: Data should not be altered by unauthorized users.
- Availability: Systems and data must be available when needed.
Example:
HTTPS encrypts communication to maintain confidentiality. Backups ensure availability. Checksums or hashes protect integrity.