|
3 | 3 | <head> |
4 | 4 | <meta charset="UTF-8" /> |
5 | 5 | <meta name="viewport" content="width=device-width, initial-scale=1.0" /> |
6 | | - <title>Mastering Web Application Security</title> |
| 6 | + <title>Understanding the CIA Triad (Confidentiality, Integrity, Availability)</title> |
7 | 7 | <style> |
8 | 8 | :root { |
9 | 9 | --bg-primary: #0a0a0a; |
|
80 | 80 | margin-top: 0.8rem; |
81 | 81 | } |
82 | 82 |
|
83 | | - code { |
84 | | - background: var(--bg-primary); |
85 | | - padding: 0.2rem 0.4rem; |
86 | | - border-radius: 4px; |
87 | | - font-family: 'Consolas', monospace; |
88 | | - color: var(--accent-hover); |
89 | | - } |
90 | | - |
91 | 83 | ul { margin-left: 1.2rem; list-style-type: disc; } |
| 84 | + |
| 85 | + strong { color: var(--text-primary); } |
92 | 86 | </style> |
93 | 87 | </head> |
94 | 88 | <body> |
95 | 89 | <div class="writeup-container"> |
96 | 90 | <a href="index.html" class="back-link">← Back to Home</a> |
97 | | - <h1>Mastering Web Application Security</h1> |
| 91 | + <h1>Understanding the CIA Triad (Confidentiality, Integrity, Availability)</h1> |
98 | 92 | <p><strong>Date:</strong> October 2025</p> |
99 | 93 |
|
100 | | - <p>This article explores how security principles intertwine with modern web development — including XSS prevention, authentication, and CSP implementation.</p> |
| 94 | + <p><em>From my first bug bounty submission to my CNS class, the CIA Triad has been at the core of everything I’ve learned about cybersecurity.</em></p> |
| 95 | + |
| 96 | + <h2>Introduction</h2> |
| 97 | + <p>This semester, I have a new subject called <strong>CNS (Cryptography and Computer Networks)</strong>. The first thing my teacher taught was the goals of security — and the answer was <strong>CIA</strong>. Interestingly, I had already come across this concept while submitting my first bug report — it asked about the CIA impact, and based on that, the platform determined the severity of the bug.</p> |
| 98 | + |
| 99 | + <p>You can think of the <strong>CIA Triad</strong> as a simple yet high-level checklist for evaluating security procedures and tools. It consists of three key principles — <strong>C (Confidentiality)</strong>, <strong>I (Integrity)</strong>, and <strong>A (Availability)</strong>. Let’s understand what each of these means.</p> |
| 100 | + |
| 101 | + <h2>1. Confidentiality</h2> |
| 102 | + <p>Confidentiality means keeping data private and accessible only to those who are authorized to see it. In other words, information should remain within the boundaries of who it’s meant for.</p> |
| 103 | + |
| 104 | + <p>Humans, driven by curiosity, often try to access things that are intentionally hidden — but in cybersecurity, this is not about curiosity, it’s about <strong>privacy</strong> and <strong>protection</strong>. Therefore, we must ensure that data remains confidential to maintain security.</p> |
| 105 | + |
| 106 | + <p>In simple terms, confidentiality means only those with proper permission or authorization can access the information.</p> |
101 | 107 |
|
102 | | - <h2>1. Preventing XSS</h2> |
103 | | - <p>Always escape dynamic content and use <code>textContent</code> instead of <code>innerHTML</code> to avoid injection points. Validate input on both client and server sides.</p> |
| 108 | + <p>Some common ways to maintain confidentiality include <strong>authentication</strong>, <strong>authorization</strong>, <strong>encryption</strong>, <strong>passwords</strong>, and <strong>digital signatures</strong>. However, as defenders strengthen security, attackers continually develop new methods to exploit weaknesses — so, defenders must always stay one step ahead.</p> |
104 | 109 |
|
105 | | - <h2>2. Using CSP</h2> |
106 | | - <p>Implement a <strong>Content Security Policy</strong> to restrict execution of untrusted scripts, mitigating XSS and data injection attacks.</p> |
| 110 | + <h2>2. Integrity</h2> |
| 111 | + <p>Integrity ensures that data is trustworthy, accurate, and free from tampering. The integrity of data is maintained only if it remains authentic, reliable, and unaltered.</p> |
107 | 112 |
|
108 | | - <h2>3. Secure Sessions</h2> |
109 | | - <p>Use secure cookies with <code>HttpOnly</code> and <code>Secure</code> flags, and ensure session invalidation upon logout or inactivity.</p> |
| 113 | + <p>If a company provides some information, users must be confident that it’s correct — otherwise, trust can be severely damaged. To preserve integrity, we must ensure that data cannot be modified by unauthorized or untrustworthy individuals.</p> |
| 114 | + |
| 115 | + <p>Techniques such as <strong>hashing</strong>, <strong>encryption</strong>, <strong>digital certificates</strong>, and <strong>digital signatures</strong> help in maintaining data integrity. For websites, using trusted <strong>Certificate Authorities (CAs)</strong> ensures that users are visiting genuine and verified websites, preventing impersonation or tampering.</p> |
| 116 | + |
| 117 | + <h2>3. Availability</h2> |
| 118 | + <p>Even if data is confidential and its integrity is maintained, it becomes useless if it isn’t available to those who need it. Availability ensures that systems, networks, and applications function properly and are accessible whenever required.</p> |
| 119 | + |
| 120 | + <p>Individuals with authorized access should be able to retrieve information quickly and efficiently without excessive delay. In today’s digital world, downtime can cause massive losses, both financially and operationally.</p> |
| 121 | + |
| 122 | + <p>One major threat to availability is a <strong>Denial-of-Service (DoS)</strong> attack, where attackers overwhelm a server with excessive traffic, causing legitimate requests to fail.</p> |
| 123 | + |
| 124 | + <p>To ensure high availability, organizations often implement <strong>redundant servers</strong>, <strong>backup networks</strong>, and <strong>failover systems</strong> — these automatically take over when the primary system is disrupted or fails.</p> |
| 125 | + |
| 126 | + <h2>Conclusion</h2> |
| 127 | + <p>The <strong>CIA Triad</strong> forms the foundation of all cybersecurity principles. Whether it’s protecting user data, securing websites, or assessing bug impacts, understanding <strong>Confidentiality</strong>, <strong>Integrity</strong>, and <strong>Availability</strong> helps us evaluate how secure a system truly is.</p> |
| 128 | + |
| 129 | + <ul> |
| 130 | + <li><strong>Confidentiality</strong> keeps data private.</li> |
| 131 | + <li><strong>Integrity</strong> keeps data accurate.</li> |
| 132 | + <li><strong>Availability</strong> keeps data accessible.</li> |
| 133 | + </ul> |
| 134 | + |
| 135 | + <p>Together, they form the <strong>core of information security.</strong></p> |
110 | 136 | </div> |
111 | 137 | </body> |
112 | 138 | </html> |
| 139 | + |
0 commit comments