Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

1.4.1. The CIA Triad as a Decision Framework

Every security control addresses one or more of these three properties:

TechnologyCIAPrimary Purpose
EncryptionProtect data from unauthorized reading
HashingDetect unauthorized modification
Digital signaturesVerify sender and detect tampering
RedundancyMaintain access despite failures
ACLsControl who can access what
BackupsRecover from corruption or loss
UPSMaintain power during outages

Exam Application: Security questions often present a scenario and ask which control best addresses it. Categorize the threat using CIA, then match to the appropriate control. Data stolen? Confidentiality → encryption. Data modified? Integrity → hashing. Service unavailable? Availability → redundancy.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications