Skip to content

Commit c8ae4a3

Browse files
authored
Update blog1.html
1 parent d7d6368 commit c8ae4a3

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

blog1.html

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,35 +94,37 @@ <h1>Understanding the CIA Triad (Confidentiality, Integrity, Availability)</h1>
9494
<p><em>From my first bug bounty submission to my CNS class, the CIA Triad has been at the core of everything I’ve learned about cybersecurity.</em></p>
9595

9696
<h2>Introduction</h2>
97-
<p>This semester, I have a new subject called <strong>CNS (Cryptography and Computer Networks)</strong>. The first thing my teacher taught was the goals of security and the answer was <strong>CIA</strong>. Interestingly, I had already come across this concept while submitting my first bug report it asked about the CIA impact, and based on that, the platform determined the severity of the bug.</p>
97+
<p>This semester, I have a new subject called <strong>CNS (Cryptography and Computer Networks)</strong>. The first thing my teacher taught was the goals of security and the answer was <strong>CIA</strong>. Interestingly, I had also come across this concept while submitting my first bug report when it asked about the CIA impact, and based on that, the platform determined the severity of the bug.</p>
9898

9999
<p>You can think of the <strong>CIA Triad</strong> as a simple yet high-level checklist for evaluating security procedures and tools. It consists of three key principles — <strong>C (Confidentiality)</strong>, <strong>I (Integrity)</strong>, and <strong>A (Availability)</strong>. Let’s understand what each of these means.</p>
100100

101101
<h2>1. Confidentiality</h2>
102102
<p>Confidentiality means keeping data private and accessible only to those who are authorized to see it. In other words, information should remain within the boundaries of who it’s meant for.</p>
103103

104-
<p>Humans, driven by curiosity, often try to access things that are intentionally hidden but in cybersecurity, this is not about curiosity, it’s about <strong>privacy</strong> and <strong>protection</strong>. Therefore, we must ensure that data remains confidential to maintain security.</p>
104+
<p>Humans, driven by curiosity, often try to access things that are intentionally hidden but in cybersecurity, this is not about curiosity, it’s about <strong>privacy</strong> and <strong>protection</strong>. Therefore, we must ensure that data remains confidential to maintain security.</p>
105105

106106
<p>In simple terms, confidentiality means only those with proper permission or authorization can access the information.</p>
107107

108-
<p>Some common ways to maintain confidentiality include <strong>authentication</strong>, <strong>authorization</strong>, <strong>encryption</strong>, <strong>passwords</strong>, and <strong>digital signatures</strong>. However, as defenders strengthen security, attackers continually develop new methods to exploit weaknesses — so, defenders must always stay one step ahead.</p>
108+
<p>Some common ways to maintain confidentiality include <strong>authentication</strong>, <strong>authorization</strong>, <strong>encryption</strong>, <strong>passwords</strong>, and <strong>digital signatures</strong>. However, as defenders strengthen security, attackers continually develop new methods to exploit weaknesses. So, defenders must always stay one step ahead.</p>
109109

110110
<h2>2. Integrity</h2>
111-
<p>Integrity ensures that data is trustworthy, accurate, and free from tampering. The integrity of data is maintained only if it remains authentic, reliable, and unaltered.</p>
111+
<p>In simple terms, I am writing this blog, and I am the author. You are reading it as my blog, so you should not be allowed to make changes to it. It sounds pretty obvious but is actually quite profound if you think about it — because without integrity, the entire foundation of data and the trust that the internet is built upon would collapse. Integrity ensures that data is trustworthy, accurate, and free from tampering. The integrity of data is maintained only if it remains authentic, reliable, and unaltered.</p>
112112

113-
<p>If a company provides some information, users must be confident that it’s correct — otherwise, trust can be severely damaged. To preserve integrity, we must ensure that data cannot be modified by unauthorized or untrustworthy individuals.</p>
113+
<p>If a company provides certain information, users must be confident that it’s correct; otherwise, their trust can be severely damaged. To preserve integrity, we must ensure that data cannot be modified by unauthorized or untrustworthy individuals.</p>
114+
115+
<p>Techniques such as <strong>hashing</strong>, <strong>encryption</strong>, <strong>digital certificates</strong>, and <strong>digital signatures</strong> help maintain data integrity. For websites, using trusted <strong>Certificate Authorities (CAs)</strong> ensures that users are visiting genuine and verified websites, preventing impersonation or tampering.</p>
114116

115-
<p>Techniques such as <strong>hashing</strong>, <strong>encryption</strong>, <strong>digital certificates</strong>, and <strong>digital signatures</strong> help in maintaining data integrity. For websites, using trusted <strong>Certificate Authorities (CAs)</strong> ensures that users are visiting genuine and verified websites, preventing impersonation or tampering.</p>
116117

117118
<h2>3. Availability</h2>
118-
<p>Even if data is confidential and its integrity is maintained, it becomes useless if it isn’t available to those who need it. Availability ensures that systems, networks, and applications function properly and are accessible whenever required.</p>
119+
<p>Even if data is confidential and its integrity is maintained, it becomes useless if it isn’t available to those who need it. Whatever I am saying or writing in this blog would be of no use if you weren’t able to read it. So, just as it’s important for data to be correct, it must also be available at the same time. Availability ensures that systems, networks, and applications function properly and remain accessible whenever required.</p>
119120

120-
<p>Individuals with authorized access should be able to retrieve information quickly and efficiently without excessive delay. In today’s digital world, downtime can cause massive losses, both financially and operationally.</p>
121+
<p>Individuals with authorized access should be able to retrieve information quickly and efficiently without unnecessary delay. In today’s digital world, downtime can cause massive losses both financially and operationally.</p>
121122

122-
<p>One major threat to availability is a <strong>Denial-of-Service (DoS)</strong> attack, where attackers overwhelm a server with excessive traffic, causing legitimate requests to fail.</p>
123+
<p>One major threat to availability is a <strong>Denial-of-Service (DoS)</strong> attack, where attackers flood a server with excessive traffic, causing legitimate requests to fail.</p>
123124

124125
<p>To ensure high availability, organizations often implement <strong>redundant servers</strong>, <strong>backup networks</strong>, and <strong>failover systems</strong> — these automatically take over when the primary system is disrupted or fails.</p>
125126

127+
126128
<h2>Conclusion</h2>
127129
<p>The <strong>CIA Triad</strong> forms the foundation of all cybersecurity principles. Whether it’s protecting user data, securing websites, or assessing bug impacts, understanding <strong>Confidentiality</strong>, <strong>Integrity</strong>, and <strong>Availability</strong> helps us evaluate how secure a system truly is.</p>
128130

@@ -133,6 +135,7 @@ <h2>Conclusion</h2>
133135
</ul>
134136

135137
<p>Together, they form the <strong>core of information security.</strong></p>
138+
THANKYOU FOR READING!!! THIS WAS MY FIRST BLOG!
136139
</div>
137140
</body>
138141
</html>

0 commit comments

Comments
 (0)