Lecture 1
Lecture 1
● To have a better understanding of how the CIA triad works in practice, consider an ATM
that allows users to access bank balances and other information. An ATM incorporates
measures to cover the principles of the triad:
○ The two-factor authentication (debit card with the PIN code) provides
confidentiality before authorizing access to sensitive data.
○ The ATM and bank software ensure data integrity by maintaining all transfer and
withdrawal records made via the ATM in the user’s bank accounting
○ The ATM provides availability as it is for public use and is accessible at all times.
Other Key Principles
● Authenticity
● Non-repudiation
● Accountability
● Privacy
● Least Privilege
● Defense-in-Depth
● Risk Management
Authenticity
● Verifying the origin and integrity of information
It helps in reducing the cyber attack surface and preventing the spread of malware also
Defense-in-Depth
Defense-in-Depth: Using multiple layers of security measures for protection
For example, Banks use Defense in Depth by having armed guards and vaults to protect money, unlike
regular stores that just use alarms and cameras. This way, even if one security measure fails, others
are in place to keep the money safe.
● Mitigating Risks: The company implements security measures like encryption, strong passwords,
and regular updates. They also continuously monitor their systems and review security practices
to address new threats and keep data secure.
Thanks!