Loading color scheme

Information Security & The CIA Triad

The Information Security & The CIA Triad lesson will:

1) explain con­fidentiality, integrity, and availability (CIA Triad) as the foundation of information security,

2) explore how email phishing attacks, fake social media accounts, ransomware, and identity theft can violate the cybersecurity goals of confidentiality, integrity and availability, and

3) describe security controls that can be used to protest computing resources.

 


Lesson Overview

 

File: Word file
Size: 91 k
Download (Word)

 

File: PDF file
Size: 614 k
Download (PDF)

 


Lesson Presentation

 

File: PowerPoint file
Size: 448 k
Download (PowerPoint)  

 

 

Gone Phishing Activity

 

File: Word file
Size: 95 k
Download (Word)

 

File: PDF file
Size: 456 k
Download (PDF)

 

 

CIA Triad Activity

 

File: Word file
Size: 72 k
Download (Word)

 

File: PDF file
Size: 512 k
Download (PDF)

 

 

Activity Solutions

 

Please send an email to obtain this file. Please provide the name of your institution and title. Email to: [email protected]

 

 

All Lesson Files

File: Zip file containing 4 files
Size: 686 k
Titles:
Information Security & The CIA Triad Overview
Information Security & The CIA Triad Presentation
Information Security & The CIA Triad Gone Phishing Activity
Information Security & The CIA Triad CIA Triad Activity
Information Security & The CIA Triad Activity Solutions -Not included.
   -  Please email [email protected] to request this file
Download all (Zip file)  

 

 


 View All C5 Cybersecurity Lessons

 

 

 

National Science Foundation

This material is based upon work supported by the National Science Foundation under Grant No.1548315.