What Is A CIA Triad? Why You Need To Know The CIA Triad For A Career Growth In Cybersecurity.

Rajesh Laskary
7 min readJan 23, 2019

Before you even proceed to read this article, I’d like to focus on one thing that you should know “There is no cybersecurity framework in the world that does not talk about the CIA, if you come across any, do not fall for it”. If you’re one of those thinking to build a career or a career growth in cybersecurity or information security space, the first thing that you must understand is, the CIA triad? — By Rajesh Laskary

Cybersecurity is paramount today for individuals and organizations as well. The Law of Supply and Demand is prevalent when it comes to cybersecurity job postings today and the number of available candidates. The fewer number of skilled resources definitely means better pay. That is one of the reasons, more and more people are opting for various industry certifications (e.g. CISSP, CISM, OSCP, CEH, etc.) and graduate and post-graduate programs. But before you invest your time or hard-earned money in any of the courses or certifications, or apply for a job in cyberspace, you must know the basics of information security. And, the first thing to start is — CIA triad.

I have been a strong advocate of learning the basics first before starting your cyber voyage. The CIA in the cybersecurity space stands for Confidentiality, Integrity, and Availability of information. And, why it is important to learn about it? Because any information security-related decision that you take in an organization as a C-level executive, a manager, or an analyst, will be involving one or more elements of the CIA. Your answer to any interview question will be vetted against these three elements. And hence, it becomes prudent to know the basics.

Confidentiality: Is to protect information from accidental or intentional disclosure.

Integrity: Is to protect information from accidental or intentional (malicious) modification.

Availability: Availability means ensuring that the information is available to those who need it and when they need it (to authorized users).

Why do we need the CIA as a basis for Information security?



Rajesh Laskary

Author, Cybersecurity, Cloud, Blockchain Professional(CISSP, CRISC, CISM, CCAK, CIAM, CIST, CEH, COBIT, CBSP, CBE, ISO27001 LA, ISO27005 RM, PMP, PMI-ACP)