When I first started exploring cybersecurity, I quickly realised it is not just about hacking or firewalls. It is a whole discipline built on frameworks, principles, and formal models that define how we think about protecting information. This post captures the core concepts I encountered early on — the ones that gave me the mental scaffolding to understand everything else.

Security Threats — What Are We Actually Protecting Against?

Before you can defend anything, you need to understand the threat landscape. Threats come in many forms: malware, ransomware, insider threats, social engineering, zero-days, DDoS attacks, and supply chain compromises. What they all have in common is that they target one or more of three fundamental properties of information — and that is where the CIA Triad comes in.

The CIA Triad

The CIA Triad is the foundation of information security. Every control, policy, and design decision ultimately maps back to one of its three pillars:

A ransomware attack, for example, destroys all three: it encrypts data (confidentiality breach), corrupts or destroys it (integrity), and makes systems unusable (availability). Understanding which pillar an attack targets helps you choose the right countermeasure.

GRC — Governance, Risk, and Compliance

GRC is the organisational side of cybersecurity. It ties together the policies, processes, and standards that keep a business legally compliant and strategically protected.

GRC might sound dry compared to hands-on hacking, but it is where security strategy lives. A vulnerability found in a pentest only gets fixed if the governance structure supports it.

Certifications — Mapping the Landscape

Cybersecurity has a rich certification ecosystem. Early on, understanding which cert fits which career path matters:

Security Models — Biba, Bell-LaPadula, and Clark-Wilson

Security models are formal frameworks that define rules for how information can flow within a system. They were developed to give rigorous, provable guarantees — especially for government and military systems. Understanding them reveals the theoretical roots of access control.

Bell-LaPadula — Protecting Confidentiality

Developed for the US military, Bell-LaPadula focuses entirely on confidentiality. Its two core rules are:

Think of it as: you can read what you're cleared for, you can write upward, but secrets never flow down.

Biba — Protecting Integrity

Biba is the integrity-focused mirror image of Bell-LaPadula. Its rules are:

Biba is relevant anywhere data quality matters — financial systems, healthcare records, audit logs.

Clark-Wilson — Commercial Integrity

Clark-Wilson was designed for commercial environments where Biba's strict lattice model is impractical. It centres on two key concepts:

Clark-Wilson is the model behind many financial and ERP systems — it is why your bank requires dual approval for large transfers.

Why This Foundation Matters

These concepts — CIA, GRC, security models — are not just theory for exams. They are the lens through which every real-world security decision is made. When I started seeing attacks and defences through this framework, the whole field started to make sense in a deeper way. This is the vision that keeps me motivated to keep going.