Chapter 08 ยท Part B

CIA Triad + AAA Framework Core

The lens through which every security question gets answered. If you only remember one framework from this course, make it this one.
CIA triad = what you're protecting: Confidentiality (keep secrets secret), Integrity (data isn't tampered with), Availability (systems are there when needed). AAA framework = how access is controlled: Authentication (who are you?), Authorisation (what can you do?), Accounting (what did you do?). Every attack violates at least one CIA pillar. Every control strengthens at least one. Every access check uses AAA. These two frameworks together explain roughly 80% of this subject.

8.1 Why Frameworks Matter

Security is a huge subject. Without a framework, every attack, every defence, and every design decision feels random. Frameworks give you a mental filing cabinet โ€” when you see a new attack, you instantly know where it fits and what defence to reach for.

The two frameworks in this chapter do different jobs:

In an exam, tagging your answers with the right framework term is worth easy marks โ€” it shows the examiner you're thinking structurally. "The attacker violated Confidentiality by reading the data in transit" scores higher than "the attacker saw the data."

8.2 The CIA Triad

The CIA Triad โ€” the three things security protects C Confidentiality I Integrity A Availability "Keep secrets secret" only the right people see it "Data is untampered" "System is there when needed" encryption protects hashing protects redundancy protects
Three pillars. Security professionals classify every attack and every control by which pillar(s) it affects. You should too.

Confidentiality โ€” keep secrets secret

Confidentiality means only authorised people can read the data. When confidentiality fails, sensitive information is exposed to someone who shouldn't see it.

Real-world examples of confidentiality:

What breaks confidentiality: packet sniffing on unencrypted Wi-Fi, data breaches (Optus, Medibank), shoulder-surfing, spyware, stolen laptops with unencrypted drives, insider threats reading data they shouldn't.

Main controls for confidentiality: encryption (both in transit via HTTPS/TLS and at rest on disks), access control (only authorised users can open the file), physical security (locked server room), classification (marking what's sensitive so people handle it correctly).

EXAM PHRASING: "This attack breaches confidentiality because the attacker is able to read [specific data] that they are not authorised to access." Name the data and who shouldn't see it โ€” specificity scores.

Integrity โ€” data hasn't been tampered with

Integrity means data is accurate and hasn't been modified, either by malicious change or accidental corruption. When integrity fails, you can't trust what you're looking at.

Real-world examples of integrity:

What breaks integrity: MITM attacks (modifying data in transit), malware that alters files, SQL injection that modifies database records, spoofing (pretending to be someone else), unauthorised edits by insiders, data corruption from hardware faults.

Main controls for integrity: hashing (produces a fingerprint that changes if data changes โ€” any tampering is detectable), digital signatures (cryptographic proof of origin AND integrity), access control (only authorised users can modify), version control & audit logs, input validation (preventing injection attacks).

TRAP: Integrity is NOT the same as confidentiality. Someone who MODIFIES your data without reading it has breached integrity only. Someone who READS your data without modifying it has breached confidentiality only. Most advanced attacks breach both, but don't conflate them in exam answers.

Availability โ€” the system is there when you need it

Availability means authorised users can access the system and data when they need to. When availability fails, legitimate users are locked out โ€” even if nothing was stolen or modified.

Real-world examples of availability:

What breaks availability: DoS and DDoS attacks, ransomware (files encrypted = unavailable), hardware failures, power outages, accidental deletion, network outages, successful attacks that take systems offline for investigation.

Main controls for availability: redundancy (backup servers, backup internet connections), backups (restore after data loss), DDoS mitigation services (Cloudflare, Akamai), load balancing (spread traffic across multiple servers), disaster recovery planning, uninterruptible power supplies.

Reminder โ€” which pillar did the big breaches attack?
Optus (2022): Confidentiality โ€” 9.8M customer records exposed.
Medibank (2022): Confidentiality primarily (data exfiltrated), plus threatened Integrity (data posted publicly).
WannaCry (2017): Availability primarily (systems encrypted, NHS surgeries cancelled).
Colonial Pipeline (2021): Availability โ€” fuel couldn't flow because billing systems were down.
Dyn DNS (2016): Availability โ€” DDoS took down DNS, which took down half the internet.

Pattern: Confidentiality attacks are more common (data theft is profitable). Availability attacks are more disruptive (they halt operations). Integrity attacks are rarer but most dangerous in regulated industries (finance, healthcare) where trust in data is everything.

CIA conflict โ€” you can't maximise all three

A subtle but important point: the three pillars often pull against each other. Pushing one up can push another down.

Strengthen this......often weakens thisExample
Confidentiality (locked down tight)Availability (users can't get in easily)MFA everywhere is more secure but adds friction โ€” users lock themselves out
Availability (always accessible)Confidentiality (easier access = more attack surface)A public-facing login page is convenient, but invites credential-stuffing attacks
Integrity (everything signed/verified)Availability (verification takes time)Heavy cryptographic verification on every request slows systems down
EXAM-GRADE INSIGHT: Good design isn't about maxing one pillar โ€” it's about finding the right balance for the specific context. A hospital prioritises availability (doctors need records during an emergency). A spy agency prioritises confidentiality (a leak ends lives). A bank prioritises integrity (a single wrong transaction is catastrophic). Whenever you justify a design choice, think about which pillar matters most for this scenario.
A student changes their grades in the school's online gradebook. Which CIA pillar did this violate?
Integrity. The data was modified without authorisation. Note: no data was stolen (so not confidentiality), and the system is still available to others (so not availability). Pure integrity attack. (It also likely involved an authentication or authorisation failure โ€” we'll cover that in section 8.4.)
A ransomware attack encrypts a company's servers. Which CIA pillar(s) are violated?
Primarily Availability โ€” the company can't access their data. Modern ransomware often also threatens Confidentiality ("pay or we publish your files" โ€” called "double extortion"). Integrity is arguably affected too if files are corrupted. Real attacks often hit multiple pillars.
Someone secretly reads emails as they pass through a public Wi-Fi network but doesn't modify them. Which pillar?
Confidentiality only. The attacker read data they shouldn't have. They didn't change anything (integrity intact) and didn't make anything unavailable. This is classic packet sniffing on an unencrypted network โ€” and it's why HTTPS matters.

8.3 Extending CIA โ€” sometimes you'll see extra letters

Some frameworks extend CIA with additional concepts. You don't need to know them all, but two come up often:

LetterConceptWhat it adds
NNon-repudiationA sender can't later deny they sent a message. Achieved through digital signatures. Matters in legal and financial contexts โ€” "you can't claim you didn't authorise this transaction."
A (second)AuthenticityA message genuinely came from who it claims to be from. Overlaps with integrity. Digital signatures provide this.

If your syllabus uses an expanded acronym (like "CIANA"), you'll see these. Otherwise stick with CIA as your workhorse.

8.4 The AAA Framework โ€” how access is actually controlled

CIA tells you what to protect. AAA tells you how access to a system is controlled when someone tries to use it. Every time you log in anywhere, all three A's are at work.

AAA โ€” three questions every access check answers 1. AUTHENTICATION "Who are you?" Proves identity via something you know, have, or are 2. AUTHORISATION "What can you do?" Checks your permissions against what you're trying to do 3. ACCOUNTING "What did you do?" Logs every action for review, billing, or investigation Log in โ†’ permissions checked โ†’ actions recorded. Every system, every time.
Sometimes written as "AAAA" with Auditing split out, but Accounting usually covers both. The core split is AuthN โ†’ AuthZ โ†’ log.

Authentication โ€” "who are you?"

Authentication proves you are who you claim to be. You prove this by providing factors โ€” pieces of evidence tied to your identity.

Factor typeAlso known asExamples
Something you knowKnowledge factorPassword, PIN, security question answer
Something you havePossession factorPhone (for SMS codes or authenticator apps), hardware key (YubiKey), smart card
Something you areInherence / biometric factorFingerprint, face scan, iris pattern, voice
Somewhere you are (sometimes)Location factorGeolocation, network location (e.g., "inside the office network")

Single-factor authentication uses just one (typically a password). Multi-factor authentication (MFA) requires two or more factors from different categories. "Password + security question" is NOT MFA โ€” both are things you know. "Password + phone code" IS MFA โ€” different categories.

TRAP: Students often confuse identification with authentication. Identification is claiming an identity (typing your username). Authentication is proving it (entering your password). You identify first, then authenticate. Getting this wrong in a detailed answer costs marks.

Authorisation โ€” "what can you do?"

Once the system knows who you are, it still has to decide what you're allowed to do. This is authorisation.

Example: at your school, every teacher is authenticated the same way (username + password). But a classroom teacher authorised to view their students' grades; the principal is authorised to view all students' grades; the IT admin is authorised to reset passwords. Same authentication, different authorisation.

Common authorisation models:

Principle of Least Privilege

The most important authorisation principle: every user and every system should have the minimum permissions needed to do their job, and no more.

Why it matters: if an account is compromised, the damage is limited to what that account could do anyway. The IT contractor account that enabled the Medibank breach should not have had access to every system โ€” that's a least-privilege failure.

REAL-WORLD APPLICATION: When you set up a new database for a web app, don't give the web app the "admin" database account. Give it a dedicated account that can only read and write the tables it needs. If the app is later hacked via SQL injection, the attacker inherits only those limited permissions โ€” not full database admin. Same principle applies everywhere: cloud roles, file permissions, VPN access.

Accounting โ€” "what did you do?"

Accounting (sometimes called Auditing) means keeping a record of who did what, when. Logs capture actions: logins, file access, configuration changes, failed attempts.

Accounting serves three purposes:

Without accounting, even if you detect a breach, you can't tell what the attacker did once inside. Chapter 15 covers how monitoring and incident response use these logs.

TRAP: Logs are only useful if someone is looking at them. Many major breaches had logs showing the attack in progress, but no one reviewed the logs until weeks later. Collecting logs โ‰  monitoring logs. In a design answer, say "logs are centralised and alerted on" โ€” not just "logs are collected."

8.5 AuthN vs AuthZ โ€” the distinction that trips everyone up

This is the single most-confused concept in the course. Lock it in now.

 Authentication (AuthN)Authorisation (AuthZ)
Question answered"Who are you?""What are you allowed to do?"
Happens...First, when you log inSecond, on every action
Checks...Credentials (password, biometric, etc.)Permissions (roles, policies)
Failure looks like..."Invalid username or password""You don't have permission to access this"
Common attacksPhishing, credential stuffing, brute forcePrivilege escalation, broken access control, IDOR
FixesStrong passwords, MFA, passwordless loginLeast privilege, RBAC, regular permission reviews
MEMORY HOOK:
AuthN = "N" for kNow who โ€” proving identity.
AuthZ = "Z" for aZZess level โ€” what you're allowed to do. (Silly, but it sticks.)

Common exam scenarios โ€” classify them:

An attacker uses SQL injection on a login page and bypasses the check entirely, logging in as admin. Is this an AuthN or AuthZ failure?
Primarily an authentication failure โ€” the system failed to properly verify the user's identity (it was tricked into accepting the attacker as "admin" without valid credentials). Once they're in as admin, the resulting excessive access is an authorisation problem too, but the root cause is AuthN broke. In exam terms: the attack exploits a failure in the authentication mechanism.
A disgruntled employee who has legitimate login access downloads the entire customer database before quitting. Which CIA pillar and which A of AAA are relevant?
CIA: Confidentiality (data has been exfiltrated to someone who shouldn't have the whole database off-site). AAA: This is an authorisation failure โ€” the employee's role likely shouldn't include "download the entire customer database" in one go. Least-privilege access and/or data loss prevention (DLP) controls would have limited the damage. Accounting is also relevant โ€” logs should flag and alert on unusual bulk downloads.

8.6 How CIA and AAA Relate

The two frameworks work together. Here's how they connect:

When this AAA step fails......this CIA pillar is at risk
Weak authentication (stolen passwords)Usually Confidentiality (attacker logs in and reads data) โ€” but could be any pillar depending on what they do
Broken authorisation (privilege escalation)All three โ€” attacker gets permissions they shouldn't have
Missing/ignored accountingIndirectly affects all three โ€” you can't detect breaches you're not watching for
THE BIG-PICTURE INSIGHT: AAA is a mechanism. CIA is an outcome. When you design security:
1. Start with CIA โ€” what outcomes do we need to protect?
2. Use AAA โ€” design access controls to achieve those outcomes
3. Layer other defences on top (encryption, segmentation, monitoring)
This is how the BSSS design-solution task (Chapter 16) is structured.

8.7 The Exam Mark-Scoring Template

For any "analyse this attack" question:

1. Name the attack type (from Chapter 10)
2. Identify the CIA pillar(s) violated โ€” C, I, A, or combinations
3. Identify the AAA step(s) that failed โ€” authentication, authorisation, or accounting
4. Explain the mechanism โ€” how the failure led to the compromise
5. Recommend defences โ€” tied to the failure modes identified

Hit all five and you have a structured, high-scoring answer.

8.8 Quick-Fire Quiz

Name the three pillars of the CIA triad and give a one-line example of each.
Confidentiality โ€” only authorised people can read data (e.g., your medical records aren't public).
Integrity โ€” data is accurate and untampered (e.g., a downloaded installer is the real one, not malware).
Availability โ€” the system is accessible when needed (e.g., online banking works when you need it).
A website forces you to enter a password AND a code from an authenticator app. What kind of authentication is this, and why is it stronger than just a password?
Multi-factor authentication (MFA). It combines something-you-know (password) with something-you-have (phone/app). It's stronger because an attacker who steals your password via phishing still can't log in โ€” they'd also need to steal your phone, or compromise the authenticator app. Different factor categories = attacker has to breach two independent things.
Explain why the principle of least privilege is one of the most important security concepts.
Least privilege limits the damage from any compromise. If every user and every service has only the minimum access they need, then a breach of one account doesn't become a breach of everything. The Medibank attacker got in via one compromised credential but then had access to the whole environment โ€” classic least-privilege failure. Applied properly, least privilege turns most breaches into small incidents instead of catastrophes. In exam terms: it reduces the blast radius of a compromise.
A company collects extensive logs but no one reviews them. A breach goes undetected for 6 months. What AAA principle was violated?
Accounting was implemented but not used effectively. Logging without monitoring is near-worthless โ€” the logs existed to detect this breach, but nobody was looking. Good security requires both collection AND review (or automated alerting via a SIEM system). This pattern โ€” "logs showed the attack but no one was watching" โ€” describes many major breaches. Chapter 15 covers monitoring properly.
โ† Previous
07. Wireless & Mobile