The Adventures of The CIA Triad

The Adventures of The CIA TriadThe Adventures of The CIA TriadThe Adventures of The CIA Triad

The Adventures of The CIA Triad

The Adventures of The CIA TriadThe Adventures of The CIA TriadThe Adventures of The CIA Triad
  • Sign In
  • Create Account

  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Shop
  • Supplementary Materials

Account


  • Orders
  • My Account
  • Sign out


  • Sign In
  • Orders
  • My Account

Cultivate Cyber Mindfulness with The CIA Triad!

What exactly happened in the Magical Cloud Valley?

This question is for the children/reader to do a recap and get an understanding of the incident that happened in the Magical Cloud Valley.

How many security breaches can you identify?

This question is to challenge the reader to identify what went wrong. Please refer to below guiding points:


  • Confidentiality and Integrity were breached - secret information was made known to unauthorized persons, causing valuable goodies to be stolen.
  • Eavesdropping occured - secret information was obtained via improper means.
  • Intrusion occured - unauthorized access to valuable goodies happened.
  • Theft of valuable goodies.

Were the security breaches intentional or unintentional?

In reality, more often than not, security breaches can happen unintentionally. This question encourages the children to reflect on the various actions of the characters in the book and discern which was done with intent. 

[Advanced readers] What consequence do you think there is for losing valuable goodies?

While it may just mean that the CIA Triad has lesser valuables in the book, the magnitude of cost and damage done to entities in reality could just be the opposite. When valuable data such as a secret recipe of a restaurant owner gets stolen, it could very well spell the end of the restaurant business exclusivity. Therefore, this question challenges readers to think deeper of the various scenarios and implications that can happen in reality to grasp the importance of securing valuable information.

[Advanced Readers] Of the 3 core security principles (CIA Triad), which is the most important?

There is no definite answer here because it depends on the requirements of various entities, businesses and people. For example, businesses in the healthcare industry will value confidentiality of patients' data more than businesses in the E-commerce industry who value availability of their webstores. This question is to get readers to understand that there is no one solution fits all when it comes to securing data. 

  • Privacy Policy
  • Terms and Conditions

The Adventures of The CIA Triad book

Copyright © 2024 Sarah Chu - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept