🎯 Learning Intention
I will explain the CIA Triad (Confidentiality, Integrity, and Availability) and identify how each principle applies to real-world data protection.
✅ Success Criteria
- I can define each part of the CIA Triad.
- I can recognize how threats exploit weaknesses in one or more of these principles.
- I can describe practical steps to improve personal and organizational security.
🌍 Why We’re Learning This
Cybersecurity isn’t just a job field — it’s a mindset.
Every secure network, system, or account is built on the same three ideas: keep data private, keep it accurate, and keep it available.
⏰ Warm-Up (10 min)
“Imagine your phone was stolen. Which would worry you more — someone reading your messages, changing your files, or locking you out completely?”
Write your response, label it C, I, or A, and explain why.
Class poll results go on board: Which part of the CIA Triad do most people fear losing first?
🧠 Mini-Lesson (20 min) — The CIA Triad and Common Threats
- Confidentiality — protecting sensitive data.
- Threats: phishing, social engineering, password leaks.
- Safeguards: MFA, encryption, least privilege.
- Integrity — ensuring data isn’t altered without permission.
- Threats: malware, tampering, insider modification.
- Safeguards: hashing, version control, backups.
- Availability — keeping systems up and accessible.
- Threats: DDoS, power failure, hardware damage.
- Safeguards: redundancy, failover, regular updates.
Detailed Notes for Students: