CIA Triad & Security Concepts
Tam giác CIA & Khái niệm Bảo mật
The CIA Triad
The CIA Triad is the foundational model of information security. All security controls, policies, and decisions map back to one or more of these three properties.
| Property | Threat Example | Controls |
|---|---|---|
| Confidentiality | Unauthorized user reads loan applicant PII | AES-256-CTR encryption, access control, data classification, mTLS |
| Integrity | Attacker modifies loan amount in transit | Hashing (SHA-256), digital signatures, checksums, input validation, HMAC |
| Availability | DDoS attack takes down KYC service | Redundancy, load balancing, backups, DDoS protection, multi-AZ deployment |
Beyond CIA — Additional Security Properties
| Property | Tiếng Việt | Definition | Mechanism |
|---|---|---|---|
| Authenticity | Tính xác thực | Data is genuine and from the claimed source | Digital signatures, certificates |
| Non-repudiation | Không thể phủ nhận | Cannot deny having performed an action | Asymmetric digital signatures + audit logs |
| Accountability | Trách nhiệm giải trình | Actions can be traced to a specific individual | Audit trail, logging, identity management |
AAA Framework
Key Terms
| Term | Tiếng Việt | Core Idea |
|---|---|---|
| Confidentiality | Bảo mật / Tính riêng tư | Only authorized users can access information |
| Integrity | Toàn vẹn dữ liệu | Data has not been altered in an unauthorized way |
| Availability | Tính sẵn sàng | Authorized users can access systems when needed |
| Non-repudiation | Không thể phủ nhận | Proof of action that cannot be denied — requires asymmetric crypto |
| Authenticity | Tính xác thực | Verified that data or identity is genuine, not forged |
- 1. Availability for financial systems: For banks and fintech, availability is often the most critical CIA property. A 99.9% SLA means at most 8.7 hours of downtime per year — exam questions about banking systems usually prioritize availability.
- 2. Non-repudiation requires ASYMMETRIC crypto: Symmetric keys are shared — either party could have generated the signature, so it cannot prove who acted. Only a private key (held by one party) can produce non-repudiable signatures. This is a common exam trap.
- 3. CIA is a triad, not a hierarchy: All three matter equally. The exam asks "which is MOST important in this context" — read the scenario carefully (confidentiality for medical data, availability for emergency services, integrity for financial transactions).
- 4. Encryption protects Confidentiality primarily — not integrity (use hashing) and not availability (use redundancy).
Mapping CIA to Platform C platform:
- Confidentiality: AES-256-CTR encryption for all PII at rest (loan applications, ID documents, biometric references); mTLS for all service-to-service communication; Vault for secrets management — no plaintext credentials in code.
- Integrity: HMAC-SHA256 on Partner D B2B API requests to detect tampering; parameterized SQL queries to prevent injection; eSign Vendor eSign ensures document integrity with legally binding signatures for Partner A loan contracts.
- Availability: 99.9% SLA commitment with Bank A means <8.7hr downtime/year; Kafka async processing ensures loan disbursement events survive temporary outages; GCP multi-AZ deployment for Partner A VN (live production).
- Non-repudiation: JWT RSA signing (RS256) means only the server's private key could have issued a token — the customer cannot claim they never authenticated. eSign Vendor creates non-repudiable loan agreements.
Practice Questions
Q1. A PostgreSQL database hosting Platform C loan records goes completely offline due to a hardware failure. No data was accessed or modified. Which CIA property was violated?
A) Availability — authorized users cannot access the system when neededQ2. A Partner A loan agreement is signed via eSign Vendor using digital signatures. Which two security properties does this primarily provide?
A) Integrity (document has not been altered) and Non-repudiation (signer cannot deny signing)Q3. AES-256-CTR is used to protect customer PII stored in the Platform A database. Which CIA property does this primarily protect?
A) Confidentiality — encryption prevents unauthorized parties from reading the dataQ4. A system requires non-repudiation for loan disbursement authorization. Which type of cryptography is required?
A) Asymmetric cryptography — only the private key holder can generate the signature, proving identityQ5. Adding mandatory MFA for all Platform C users improves security but increases login time by 15 seconds. Which CIA trade-off does this represent?
A) Confidentiality improved at the cost of some Availability (user friction/accessibility)