Confidentiality
Confidentiality means information is accessible only to those who are authorized to see it. When confidentiality is violated, data is exposed to someone who should not have it. The breach might be deliberate, like an attacker stealing credentials to read private emails, or accidental, like a misconfigured S3 bucket making internal documents publicly accessible.
Controls that protect confidentiality include encryption (data becomes unreadable without the key), access controls (only authorized users can open the file), and data classification (knowing what data is sensitive so you can protect it appropriately). Multi-factor authentication supports confidentiality by making credential theft insufficient on its own.
On exams, confidentiality questions often involve encryption, need-to-know access, and data exposure scenarios. If a question describes an attacker reading data they should not have seen, confidentiality is the violated property.
Integrity
Integrity means data has not been altered in an unauthorized way and that its source is trustworthy. Integrity violations happen when an attacker modifies data in transit, corrupts a file, or tampers with logs to cover their tracks. The problem is not always that someone read the data, but that they changed it.
Hashing is the primary tool for verifying integrity. A hash function produces a fixed-size fingerprint of any input. If the file changes even slightly, the hash changes completely. When you download software and verify a SHA-256 checksum, you are checking integrity. Digital signatures combine hashing with asymmetric encryption to verify both integrity and the identity of the sender.
Data integrity matters as much as data confidentiality in many contexts. A confidential medical record that has been tampered with can lead to the wrong treatment. Financial records that have been altered can support fraud. Logs that have been modified hide evidence of an attack.
Availability and how to choose the correct answer
Availability means systems and data are accessible to authorized users when they need them. A system can be perfectly confidential and perfectly intact but still fail if it is not available. DDoS attacks target availability directly by overwhelming systems with traffic until legitimate requests cannot get through. Ransomware that encrypts your files also attacks availability because you cannot access your own data.
Controls that protect availability include redundancy (duplicate systems and links so no single failure brings everything down), failover (automatic switchover to backup systems), load balancing (distributing traffic so no single server is overwhelmed), and regular backups (restore from backup when data is inaccessible).
Identifying which CIA property is attacked: data read by an unauthorized party = confidentiality. Data modified without authorization = integrity. System or data not accessible = availability. Many attacks target multiple properties simultaneously. Ransomware encrypts files (availability) and sometimes exfiltrates them before encrypting (confidentiality).
DAD is the opposite of CIA: Disclosure (vs confidentiality), Alteration (vs integrity), Destruction/Denial (vs availability).