Course contentsShow
Security
Lesson 1 of 3,0521. Security Mindset and FoundationsFree lesson

CIA Triad: Confidentiality, Integrity, Availability

Understanding the three foundational pillars of information security and their trade-offs in system design.

CIA Triad: Confidentiality, Integrity, Availability

What you'll learn: The three core principles that guide every security decision you'll ever make.

What is the CIA Triad?

The CIA Triad is the foundational framework for information security. Think of it as three pillars holding up a building—if any one weakens, the entire structure becomes vulnerable.

Confidentiality

Keeping secrets secret. Only authorized people should access sensitive information.

Real-world analogy: Your medical records should only be viewable by you and your healthcare providers, not by random employees at the hospital.

Integrity

Keeping data accurate and trustworthy. Information shouldn't be altered without authorization, and you must detect if tampering occurs.

Real-world analogy: When you check your bank balance, you need confidence that the number hasn't been secretly changed by an attacker. If you deposited $500, it should show $500—not $5 or $50,000.

Availability

Keeping systems accessible when needed. Authorized users should be able to access information and services reliably.

Real-world analogy: An ATM that's completely secure but never works is useless. You need to withdraw cash when you need it, not just "sometime eventually."

The Trade-offs

Here's the tricky part: these three goals sometimes conflict.

  • Maximum confidentiality might mean locking everything down so tightly that availability suffers (too many authentication steps slow things down).
  • Perfect availability might mean fewer security checks, risking confidentiality.
  • Extreme integrity verification might slow systems down, affecting availability.

Security professionals constantly balance these three principles based on what matters most for each situation. A public website prioritizes availability; a nuclear launch system prioritizes integrity.

Key Takeaway: Every security decision you make will involve balancing Confidentiality, Integrity, and Availability—understand which matters most for your specific context, because you can't always maximize all three simultaneously.