Skip to main content
Beta v10|PLEASE REPORT ALL ISSUES|Report a Problem|Please allow minimum of 48 hrs for Problem Reports to be fixed
← Back to Cybersecurity samples
🛡️Cybersecurity·15 min·Sample Lesson

Core Principles of Cybersecurity

CYBERSECURITY is about protecting digital systems — the computers, phones, and networks we use every day. The field is huge, but it rests on 3 core principles known by the letters C-I-A. Understanding them gives you the lens to see security in EVERY app, website, and device you use.

The CIA Triad

**C — CONFIDENTIALITY** — only the right people see the information.\nExample: your private Instagram DMs should only be visible to you and your friend.\n\n**I — INTEGRITY** — the information is NOT changed by unauthorized people.\nExample: your bank balance shows the correct amount; a hacker cannot change it.\n\n**A — AVAILABILITY** — when you need the info or system, it is WORKING.\nExample: when you open YouTube, it loads.\n\nEvery attack ATTACKS one of these 3 things. Every defense PROTECTS one of these 3 things.

Common Attacks

- **Phishing** — trick you into giving up passwords (hurts CONFIDENTIALITY)\n- **Ransomware** — encrypt your files and demand money (hurts AVAILABILITY)\n- **Data breach** — steal information from a company (hurts CONFIDENTIALITY)\n- **Defacement** — change a website's content (hurts INTEGRITY)\n- **DDoS (Distributed Denial of Service)** — flood a site with traffic so real users cannot reach it (hurts AVAILABILITY)\n- **Man-in-the-middle** — intercept communication in transit (hurts CONFIDENTIALITY and INTEGRITY)

What are the 3 parts of the CIA Triad?

The Defender's Mindset

Security professionals think differently. They ask:\n\n- What am I trying to PROTECT (the asset)?\n- Who might WANT it (the threat)?\n- What are the WEAKNESSES in my defenses (the vulnerability)?\n- What happens if I LOSE it (the impact)?\n\nThis is called THREAT MODELING. Good defenders ALWAYS do it before building or defending a system.

Defense in Depth

Never rely on ONE layer of security. A good system has MANY:\n\n1. **Strong passwords** — the first lock\n2. **Two-factor authentication (2FA)** — a second lock even if password leaks\n3. **Encryption** — data unreadable even if stolen\n4. **Firewall** — blocks suspicious network traffic\n5. **Backups** — recover even if ransomware hits\n6. **Software updates** — patch known vulnerabilities\n7. **User training** — humans are often the weakest link\n\nIf an attacker gets through layer 1, layer 2 catches them. Layer 3 catches layer-2 failures. This is "defense in depth."

The Human Factor

The most powerful hacker tool is not code — it is SOCIAL ENGINEERING. Tricking people. The 2020 Twitter hack of Elon Musk, Obama, and Biden's accounts? A teenager called Twitter's support pretending to be IT. One phone call. No code.\n\nDefenders must protect against:\n\n- Phishing emails\n- Phone scams\n- Fake tech support\n- Pretexting (making up stories to get info)\n- Shoulder surfing (watching someone type a password)\n\nTechnical security means nothing if someone gives away the password.

Why is "defense in depth" important?

Careers in Cybersecurity

- **Security Analyst** — watches for attacks in real time\n- **Penetration Tester (ethical hacker)** — gets PAID to break into systems to find holes before bad guys do\n- **Security Engineer** — builds secure systems\n- **Incident Responder** — handles attacks when they happen\n- **Governance, Risk, and Compliance (GRC)** — makes sure companies follow security rules\n- **CISO (Chief Information Security Officer)** — top executive for security at a company\n\nCybersecurity has over 3.5 MILLION UNFILLED jobs globally in 2026. Salaries start at $70K and top experts earn $300K+. Almost every industry needs these roles.

🎯

Threat Model Your Life

Pick one of these systems to model:\n\n- Your Instagram account\n- Your school portal\n- Your family's home WiFi\n\nAnswer:\n1. What am I protecting? (photos? grades? internet access?)\n2. Who might want it? (strangers? classmates? hackers?)\n3. What are my current defenses? (password? 2FA?)\n4. What vulnerabilities exist? (old password? no 2FA?)\n5. What would be the IMPACT if compromised?\n6. What ONE defense should I add now?\n\nThis is literal cybersecurity homework for professionals.

🎯

Enable 2FA on 3 Accounts

With a parent's help:\n\n1. Pick 3 important accounts (Google, Instagram, school portal).\n2. Go to each account's security settings.\n3. Enable 2-factor authentication (2FA).\n4. Options include: SMS text, authenticator app (better!), or security key (best!).\n5. Save backup codes in a safe place.\n6. You just prevented the MOST common form of account takeover.

Why This Matters

Every career now touches cybersecurity. Doctors must protect patient records. Teachers must protect student data. Store managers must protect credit card info. The CIA Triad is a lens for evaluating ANY system. Even if you never become a "security expert," knowing these principles makes you a safer person — and a valuable employee.

Which type of attack tries to trick HUMANS (not computers) into giving up passwords or info?

Want to keep learning?

Sign up for free to access the full curriculum — all subjects, all ages.

Start Learning Free