By RecOsint | Dec 1, 2025
Security is a three-part model that must be met simultaneously: 1- Confidentiality (C) 2- Integrity (I) 3- Availability (A) If any one pillar fails, security fails.
- Meaning: Data is only viewable by authorized people. – Goal: Prevent unauthorized disclosure. – Example: Encrypting your emails so only the recipient can read them. – Threat: Password theft, Phishing, Eavesdropping.
- Meaning: Data is complete, accurate, and trustworthy. – Goal: Prevent unauthorized modification. – Example: Ensuring a hacker hasn't secretly changed the numbers in a bank transfer. – Threat: Malware altering files, SQL Injection.
- Meaning: Authorized users can access the system when they need it. – Goal: Prevent service interruption. – Example: Your banking app must be online 24/7, even during high traffic. – Threat: DDoS Attacks, Ransomware locking files.
The Balancing Act You cannot always have 100% of all three. – Example: If you unplug a server to make it perfectly safe (High Confidentiality), no one can use it (Zero Availability). – The Job: A security pro finds the right balance for the business.
Every security tool, policy, and decision protects one of these three pillars. – Remember: Security isn't just about hiding data; it's about keeping it Correct and Accessible too.