Five_Pillars_of_Information_Security_Easy.pptx

asrarmushtaq1995 0 views 9 slides Oct 13, 2025
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

Questions about the CIA Triad:
What is the CIA triad?
What does confidentiality mean in information security?
What does integrity mean in information security?
What does availability mean in information security?
Can you provide an example of a breach of confidentiality?
How can data integrity be pr...


Slide Content

The Five Pillars of Information Security (Easy Explanation) Confidentiality | Integrity | Availability | Authenticity | Non-repudiation

1. Confidentiality Keep information secret from people who shouldn’t see it. Example: Locking your phone with a password. How to protect: Use passwords, encryption, and access control.

2. Integrity Keep information correct and unchanged. Example: Making sure no one edits your report without permission. How to protect: Use digital signatures, checksums, and version backups.

3. Availability Make sure information is always ready when needed. Example: Bank website being online so you can check your account. How to protect: Use backups, reliable servers, and recovery plans.

4. Authenticity Confirm people or systems are who they say they are. Example: Logging into Facebook with your password. How to protect: Use digital certificates and two-factor authentication.

5. Non-repudiation Make sure no one can deny what they did. Example: You can’t deny sending money online; system keeps proof. How to protect: Use digital signatures and logs.

Summary Five pillars work together to protect data: • Confidentiality → Keeps it secret • Integrity → Keeps it correct • Availability → Keeps it ready to use • Authenticity → Confirms identity • Non-repudiation → Proves who did what

Simple Example You tell your secret plan to a trusted friend. They won’t tell anyone (Confidentiality), Your team can access it (Availability), But your friend mixes details (Integrity lost).

In Real Life • Confidentiality: Use encryption • Integrity: Use hashing • Authenticity & Non-repudiation: Use digital signatures • Availability: Use backups and strong systems
Tags