The CIA Triad

Anatomy of an Attack
IAM
Protocols & Tools
Compliance
100

The pillar of the triad focused entirely on keeping secrets safe so that only authorized people can view the data.

What is Confidentiality?

100

A weakness or flaw present in your system or network.

What is a Vulnerability?

100

The process of proving your identity at the front door to answer the question, "Who are you?"

What is Authentication?

100

A feature that allows users to authenticate just once to access multiple different services without needing to re-enter their credentials.

What is Single Sign-On (SSO)?

100

Regular, rigorous checks performed by internal or external inspectors to ensure security protocols are actually being followed.

What are Audits?

200

The pillar of the triad that ensures systems and data are actually up and running whenever authorized users need them.

What is Availability?

200

A potential danger that could trigger a weakness in your system.

What is a Threat?

200

The process that determines your exact permissions once inside the network, answering the question, "What can you do?"

What is Authorization?

200

In a Public Key Infrastructure (PKI), this is the key that is mathematically linked to your public key but must be kept highly secure to unlock your data.

What is a Private Key?

200

The strict set of rules a company must follow if they process, store, or transmit credit card data.

What is PCI DSS (Payment Card Industry Data Security Standard)?

300

The pillar of the triad that prevents tampering and ensures data hasn't been maliciously altered.

What is Integrity?

300

The actual technical tool or method an attacker uses to take advantage of a vulnerability.

What is an Exploit?

300

The golden rule that mandates giving a user only the exact access required to perform their specific duties, and absolutely nothing more.

What is the Principle of Least Privilege?

300

Acting as the digital phonebook, this protocol is used for centralizing network and corporate directories.

What is LDAP (Lightweight Directory Access Protocol)?

300

Comprehensive privacy laws designed to protect the personal data of European Union citizens.

What is GDPR (General Data Protection Regulation)?

400

A hacker using ransomware to lock a hospital out of its own patient database is primarily an attack on this specific pillar of the triad.

What is Availability?

400

The overall likelihood and potential impact of a successful attack against your organization.

What is Risk?

400

Requiring a user to log in using something they know (a password) plus something they are (a fingerprint) is an example of this.

What is Multifactor Authentication (MFA)?

400

This heavy-lifting markup language engine is what actually makes web-based Single Sign-On (SSO) possible.

What is SAML (Security Assertion Markup Language)?

400

Legal rules based on geographic borders that dictate exactly where in the physical world a server storing specific data must be kept.

What is Data Locality?

500

A hacker successfully intercepting an unencrypted email and reading the secret contents is a failure of this pillar.

What is Confidentiality?

500

According to the lesson, Risk is the sum of these three elements combined.

What are Vulnerability + Threat + Exploit?

500

An authorization method that groups system privileges together by job title, like a "Teacher Profile" versus a "Student Profile."

What is Role-Based Access Control (RBAC)?

500

Developed at MIT, this backend protocol uses the DES cryptographic algorithm and is very popular on Cisco routers.

What is Kerberos?

500

When dealing with Data Locality, these real-world boundaries are the primary factor in dictating exactly where a physical server must be kept.

What are geographic borders?