Information Security & The CIA Triad Lesson
Upon completion of the Information Security & The CIA Triad lesson, students will:
1) explain confidentiality, integrity, and availability (CIA Triad) as the foundation of information security,
2) explore how email phishing attacks, fake social media accounts, ransomware,and identity theft can violate the cybersecurity goals of confidentiality, integrity and availability,
3) describe security controls that can be used to protect computing resources.
Lesson Overview
File: Word file
Size: 91 k
Download (Word)
File: PDF file
Size: 614 k
Download (PDF)
Lesson Presentation
File: PowerPoint file
Size: 448 k
Download (PowerPoint)
Gone Phishing Activity
File: Word file
Size: 95 k
Download (Word)
File: PDF file
Size: 456 k
Download (PDF)
CIA Triad Activity
File: Word file
Size: 72 k
Download (Word)
File: PDF file
Size: 512 k
Download (PDF)
Activity Solutions
Please send an email to obtain this file. Please provide the name of your institution and title. Email to: info@ncyte.net
All Lesson Files
File: Zip file containing 4 files
Size: 686 k
Titles:
Information Security & The CIA Triad Overview
Information Security & The CIA Triad Presentation
Information Security & The CIA Triad Gone Phishing Activity
Information Security & The CIA Triad CIA Triad Activity
Information Security & The CIA Triad Activity Solutions -Not included.
- Please email info@ncyte.net to request this file
Download all (Zip file)
![]() |
This material is based upon work supported by the National Science Foundation under Grant No.1548315. |