Back to Home

Core Idea of Cybersecurity

Foundation concept for security awareness and architecture decisions.

Cybersecurity is protecting systems, applications, and data from unauthorized access, manipulation, or disruption.

Protect Systems

Secure servers, endpoints, networks, and cloud infrastructure to keep environments reliable and controlled.

Protect Applications

Build and run software with secure coding, patching, testing, and access controls to reduce exploit paths.

Protect Data

Use classification, encryption, backup, and monitoring to preserve confidentiality, integrity, and availability.

CIA Triad

The foundation for all security decisions:

CCia Triad

Confidentiality

Only the right people/systems can see data.

Example: Prevent cross-tenant data leaks in a SaaS CRM/HRMS.

ICia Triad

Integrity

Data and actions cannot be altered incorrectly.

Example: Prevent salary approval, role changes, or order edits via token tampering or bypass.

ACia Triad

Availability

Systems must stay usable and resilient.

Example: Protect APIs from DDoS, brute force, and resource exhaustion.