Cybersecurity Fundamentals

Pravin BhatiyaPravin Bhatiya
2 min read
  • Core Concepts – Think Like a Cyber Defender

Part 3: The CIA Triad – The Heartbeat of Cybersecurity

Want to crack any cybersecurity interview or understand why digital security exists? Start with the CIA Triad.

Nope, not the spy agency — this CIA stands for:


🔹 C – Confidentiality
Your data stays private. Only the right person can access it.

🔐 Example: Encryption of emails and files so that unauthorized people can’t read them.

"Jaise tumhara WhatsApp chat sirf tum dono ko hi dikhna chahiye — that’s confidentiality."


🔹 I – Integrity
Your data stays accurate and unaltered.

Example: A hospital record should not be edited by someone unauthorized. Even a small change can be dangerous.

Tip: Use hashing (like SHA-256) to verify data integrity.


🔹 A – Availability
Your data is available when you need it — without delay or downtime.

Example: If your banking app goes down during an emergency transfer, availability has failed.


?? Why It Matters:

Everything in cybersecurity — firewalls, access control, antivirus, encryption — works to maintain CIA.

Interview Hack:
If asked about any cyber attack, analyze which part of CIA it affects.

Ransomware? Affects Availability.
Phishing? Affects Confidentiality.


Action for Beginners:

  • Learn basic cryptography and hashing.

  • Try solving CIA case studies from platforms like TryHackMe.

0
Subscribe to my newsletter

Read articles from Pravin Bhatiya directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Pravin Bhatiya
Pravin Bhatiya