Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

1.2. The Three Pillars of Security Thinking

💡 First Principle: Every information security objective traces back to three core properties — confidentiality (limited access), integrity (trustworthy state), and availability (accessible when needed) — plus two supporting properties for accountability: authenticity (verified identity) and nonrepudiation (undeniable actions). Understanding which pillar is threatened or supported immediately narrows your answer options.

When you encounter any exam scenario, the first analytical question is: Which pillar is at stake? A ransomware attack primarily threatens availability. A data theft attack threatens confidentiality. An invoice manipulation attack threatens integrity. The appropriate controls flow directly from the answer.

PillarCore QuestionPrimary ThreatPrimary Control
ConfidentialityCan only authorized people read this?Unauthorized disclosureEncryption, access controls, classification
IntegrityIs this data accurate and unaltered?Unauthorized modificationHashing, digital signatures, change controls
AvailabilityCan authorized users access this when needed?Disruption, destructionRedundancy, backups, DR planning
AuthenticityIs this really from who it claims?Impersonation, spoofingDigital certificates, MFA
NonrepudiationCan the sender deny this action?RepudiationDigital signatures, audit logs

⚠️ Common Misconception: Many candidates treat "authentication" and "nonrepudiation" as near-synonyms. Authentication proves identity at a moment in time and can be denied later ("my credentials were stolen"). Nonrepudiation provides cryptographic proof that cannot be repudiated — digital signatures accomplish this because only the private key holder could have produced the signature.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications