## What is the CIA Triad?
- A cybersecurity model with three core principles.
1. **Confidentiality**
2. **Integrity**
3. **Availability**
---
## Confidentiality
- Protects information from unauthorized access.
- Key Measures for Confidentiality
- **Encryption:** Secure data formats.
- **Access Controls:** Restrict data access.
- **Authentication Mechanisms:** Verify user identities.
---
## Integrity
- Maintains data accuracy and reliability.
- Prevents unauthorized modifications.
- Ensures trustworthy information.
- Key Measures for Integrity
- **Hashing:** Verify data alterations.
- **Version Control:** Track data changes.
- **Audit Trails:** Log data access and changes.
---
## Availability
- Ensures information is accessible when needed.
- Prevents downtime and disruptions.
- Supports business continuity.
- Key Measures for Availability
- **Redundancy:** Load balancing
- **Regular Backups:** Scheduled data copies.
- **Disaster Recovery Plans:** Restore systems after events.
---
## Conclusion
- **Cornerstone of Information Security:** Guides robust security strategies.
- **Protects Data:** Ensures confidentiality, integrity, and availability.
- **Supports Compliance:** Maintains trust and compliance.