Cybersecurity Fundamentals


Core Concepts – Think Like a Cyber Defender
Part 3: The CIA Triad – The Heartbeat of Cybersecurity
Want to crack any cybersecurity interview or understand why digital security exists? Start with the CIA Triad.
Nope, not the spy agency — this CIA stands for:
🔹 C – Confidentiality
Your data stays private. Only the right person can access it.
🔐 Example: Encryption of emails and files so that unauthorized people can’t read them.
"Jaise tumhara WhatsApp chat sirf tum dono ko hi dikhna chahiye — that’s confidentiality."
🔹 I – Integrity
Your data stays accurate and unaltered.
Example: A hospital record should not be edited by someone unauthorized. Even a small change can be dangerous.
Tip: Use hashing (like SHA-256) to verify data integrity.
🔹 A – Availability
Your data is available when you need it — without delay or downtime.
Example: If your banking app goes down during an emergency transfer, availability has failed.
?? Why It Matters:
Everything in cybersecurity — firewalls, access control, antivirus, encryption — works to maintain CIA.
Interview Hack:
If asked about any cyber attack, analyze which part of CIA it affects.
Ransomware? Affects Availability.
Phishing? Affects Confidentiality.
Action for Beginners:
Learn basic cryptography and hashing.
Try solving CIA case studies from platforms like TryHackMe.
Subscribe to my newsletter
Read articles from Pravin Bhatiya directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
