Questions about the CIA Triad:
What is the CIA triad?
What does confidentiality mean in information security?
What does integrity mean in information security?
What does availability mean in information security?
Can you provide an example of a breach of confidentiality?
How can data integrity be pr...
Questions about the CIA Triad:
What is the CIA triad?
What does confidentiality mean in information security?
What does integrity mean in information security?
What does availability mean in information security?
Can you provide an example of a breach of confidentiality?
How can data integrity be protected?
Questions about the AAA Framework:
What is the AAA framework in information security?
What is the difference between authentication and authorization?
How is user activity logged and tracked?
What is the principle of "least privilege"?
Questions about Extended Principles:
What is the difference between authenticity and non-repudiation?
Why is accountability important in information security?
How does a digital signature contribute to non-repudiation?
Questions about Strategic Concepts:
What is defense in depth?
What are the different layers of defense used in a "defense in depth" strategy?
What is the role of risk management in information security?
What is information security governance?
General Questions:
What are the fundamental concepts of information security?
What are some core principles that modern information security relies on?
Size: 35.19 KB
Language: en
Added: Oct 13, 2025
Slides: 9 pages
Slide Content
The Five Pillars of Information Security (Easy Explanation) Confidentiality | Integrity | Availability | Authenticity | Non-repudiation
1. Confidentiality Keep information secret from people who shouldn’t see it. Example: Locking your phone with a password. How to protect: Use passwords, encryption, and access control.
2. Integrity Keep information correct and unchanged. Example: Making sure no one edits your report without permission. How to protect: Use digital signatures, checksums, and version backups.
3. Availability Make sure information is always ready when needed. Example: Bank website being online so you can check your account. How to protect: Use backups, reliable servers, and recovery plans.
4. Authenticity Confirm people or systems are who they say they are. Example: Logging into Facebook with your password. How to protect: Use digital certificates and two-factor authentication.
5. Non-repudiation Make sure no one can deny what they did. Example: You can’t deny sending money online; system keeps proof. How to protect: Use digital signatures and logs.
Summary Five pillars work together to protect data: • Confidentiality → Keeps it secret • Integrity → Keeps it correct • Availability → Keeps it ready to use • Authenticity → Confirms identity • Non-repudiation → Proves who did what
Simple Example You tell your secret plan to a trusted friend. They won’t tell anyone (Confidentiality), Your team can access it (Availability), But your friend mixes details (Integrity lost).
In Real Life • Confidentiality: Use encryption • Integrity: Use hashing • Authenticity & Non-repudiation: Use digital signatures • Availability: Use backups and strong systems