1 Introduction
The contemporary world is intrinsically linked to the digital domain, making information the
most valuable commodity. As society continues its rapid migration to cloud services, inter-
connected devices, and digital transaction systems, the imperative for robust cybersecurity
measures has never been greater. Cybersecurity, in its essence, is the practice of protecting
systems, networks, and programs from digital attacks. These cyberattacks are typically aimed
at accessing, changing, or destroying sensitive information, extorting money from users, or
interrupting normal business processes.
The importance of cybersecurity in the digital era stems directly from our reliance on tech-
nology. Critical infrastructure, including power grids, financial markets, and healthcare sys-
tems, is managed by networked computers, and the compromise of any one system can have
catastrophic real-world consequences. Personal data, intellectual property, and governmen-
tal secrets are all stored and transmitted digitally, making their protection a matter of national
and economic security.
A foundational understanding of cybersecurity requires an appreciation of the real-world
controls deployed to mitigate risk. A relevant example is a major financial institution, such as
a bank, implementingMulti-Factor Authentication (MFA)for all online banking accounts.
This simple addition moves beyond requiring just a password (something the user *knows*)
to requiring a second factor, such as a one-time code generated on a mobile device (something
the user *has*). By layering this control, the bank drastically reduces the probability of unau-
thorized account access, even if a user’s primary password is stolen through a data breach or
phishing attack. This illustrates cybersecurity as a proactive, layered discipline designed to
maintain trust and functionality in digital systems.
User Tries to Log InPassword Check (Knowledge)OTP/Token Check (Possession)Access GrantedStep 1: SuccessfulStep 2: SuccessfulStep 3: Successful
Figure 1: Diagram illustrating the layered steps of Multi-Factor Authentication (MFA).
2 The CIA Triad
The CIA Triad is the cornerstone of information security policy and strategy. It represents
three core security goals that organizations strive to achieve: Confidentiality, Integrity, and
Availability. These three principles are interdependent, and security measures are often eval-
uated based on how well they support each component.
ConfidentialityIntegrityAvailabilityThe intersection
is theGoalof In-
formation Security
Figure 2: The CIA Triad: The Fundamental Goals of Information Security.
1