- An information security model to guide an organization’s security policies and procedures. The CIA triad is used to evaluate threats and vulnerabilities based on confidentiality, integrity, and availability of an organization’s assets.
- Previous term: Confidentiality agreement
- Next term: Configuration drift
- Random term: AWK