YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
access  authenticity  authorized  availability  confidentiality  digital  encryption  integrity  million  password  repudiation  security  signatures  single  systems  
LATEST POSTS

What Are the 5 Aims of Security? Breaking Down the Real Goals Behind Protection

Confidentiality: Keeping Secrets from the Wrong Eyes

At its core, confidentiality means only authorized individuals can access information. It does not mean everything is hidden—it means the right things are hidden from the wrong people. Think of a doctor’s office. Your medical history isn’t public, but it is accessible to your physician, pharmacist, and maybe your insurance provider (with consent). That selective access? That’s confidentiality in action.

Encryption is the go-to tool here—AES-256, for example, uses a 256-bit key, which means there are 2^256 possible combinations. That’s more than the number of atoms in the known universe. Yet, we still see breaches. Why? Because encryption only works if keys are managed securely. A hospital in Florida lost over 1.5 million patient records in 2022 not because the encryption failed, but because an admin stored the decryption key in a shared folder labeled “DO NOT DELETE (seriously).”

And that’s exactly where people don’t think about this enough: technology is only as strong as the weakest human link. You can have military-grade encryption, but if someone writes their password on a sticky note under the keyboard, the system fails. Multi-factor authentication helps, yes—but even that can be bypassed through SIM-swapping attacks, which increased by 22% in 2023 according to the FCC.

Because of this, confidentiality isn’t a one-time setup. It’s continuous. Permissions must be reviewed. Access logs audited. Employees trained. And let’s be clear about this—confidentiality isn’t just for corporations. Your personal data, from social security numbers to dating app preferences, is valuable. Hackers aren’t just after bank accounts; they’re after your identity, your habits, your life.

Integrity: Ensuring Data Stays Untouched and True

Integrity ensures that information remains accurate and unaltered during storage or transmission. It’s not enough for data to be private; it must also be trustworthy. If a hacker changes the interest rate in a loan agreement from 3.8% to 8.3%, the document is still confidential—only authorized parties see it—but the integrity is gone. That changes everything.

Hash functions like SHA-256 are used to verify integrity. When you download software, the site often provides a hash value. Once downloaded, you run the same algorithm. If the hashes match, the file hasn’t been tampered with. But if they don’t? That’s a red flag. In 2021, a compromised update server for Kaseya software pushed malware to 1,500 businesses because the integrity check was either missing or ignored. The attackers didn’t break in—they were invited in, disguised as a legitimate update.

How Checksums and Digital Signatures Work Together

Checksums are basic integrity tools—simple math that gives a quick snapshot of data. Digital signatures go further, combining encryption and hashing. The sender signs the message with their private key. The recipient verifies it with the public key. If it matches, you know two things: the message hasn’t changed, and it really came from that person. This is how banks verify transaction instructions. It’s also how blockchain confirms every transaction in the chain—each block contains the hash of the previous one, creating a tamper-evident ledger.

But here’s the catch: digital signatures rely on trust in the certificate authority. If that authority is compromised, the whole system wobbles. In 2011, DigiNotar was hacked, and 531 fraudulent certificates were issued—including one for google.com. That allowed attackers to intercept communications from 300,000 Iranian Gmail users. The integrity was technically intact, but the trust layer had collapsed.

Availability: Making Sure Systems Work When Needed

Availability means systems and data are accessible when authorized users need them. A perfectly confidential and intact system is useless if it’s down. Imagine a hospital’s patient database going offline during surgery. No records. No drug histories. No alerts for allergies. Seconds matter.

DDoS attacks are the classic availability threat. In 2023, Google mitigated a 398 million request-per-second attack—the largest ever recorded. That’s like every person in the U.S. sending 120 requests to a single server, all in one second. Cloudflare, AWS, and Akamai absorb these daily, but smaller organizations don’t have that armor. A single sustained attack can knock a small business offline for days, costing an average of $8,000 per hour in downtime.

Redundancy and Failover: The Unsung Heroes of Uptime

Redundancy is the practice of duplicating critical components. Multiple servers, power supplies, internet connections. Failover is the automatic switch to a backup when the primary fails. Together, they keep services running. Amazon Web Services uses a multi-zone architecture—data centers spread across regions. When one fails, traffic reroutes. That’s why Netflix, despite relying entirely on AWS, rarely goes down.

Yet, redundancy isn’t foolproof. In 2017, an engineer typo during a routine update caused the S3 storage service in the U.S.-East-1 region to crash. Over 150,000 websites and apps were affected for four hours. No attack. No malware. Just a human error. So while redundancy helps, it can’t eliminate risk—only reduce it.

Authenticity vs. Non-Repudiation: Two Sides of Identity

Authenticity confirms that a user, system, or message is genuinely who or what it claims to be. Non-repudiation ensures that a party cannot deny having performed an action—like sending a message or approving a transaction. They’re related, but distinct. It’s a bit like showing a passport at customs (authenticity) versus signing a legal document with a notary present (non-repudiation).

Why Two-Factor Authentication Isn’t Always Enough

Authenticity often relies on three factors: something you know (password), something you have (phone, token), and something you are (fingerprint, face). Two-factor authentication (2FA) combines two of these. But phishing attacks now bypass 2FA using real-time proxy sites. You log in, thinking you’re on your bank’s portal—except you’re on a clone. The attacker captures your credentials and 2FA code, then logs in behind you. In 2022, 36% of successful breaches involved some form of credential theft, despite 2FA being enabled.

Digital Signatures and Audit Trails: The Backbone of Non-Repudiation

Non-repudiation requires proof. Digital signatures, timestamped logs, and blockchain-style ledgers provide that. When a CEO signs a million-dollar wire transfer, the system logs the IP address, device, time, and cryptographic signature. Later, they can’t claim, “I didn’t do it.” But—and this is where it gets tricky—non-repudiation fails if private keys are stolen. If your signing key is compromised, the attacker can act as you. And without proper key management, you’re far from it when it comes to real accountability.

Common Misconceptions About the 5 Aims of Security

One myth is that these aims are equally prioritized in every system. That’s not true. A military network prioritizes confidentiality above all. A stock trading platform? Availability and integrity trump everything—no one wants delayed or altered trades. A social media site might emphasize availability and authenticity, even if it means lower confidentiality (hence the endless data leaks).

Another misconception: achieving all five means you’re “secure.” Security is not a binary state. It’s a spectrum. You can be 90% protected today and 30% tomorrow if a zero-day exploit emerges. And honestly, it is unclear how much “secure” is enough. The average cost of a cybersecurity program for a mid-sized company is $1.3 million annually. Is it worth it? For some, yes. For others, a data breach is just a cost of doing business.

I find this overrated: the idea that more security is always better. Over-securing a system can make it unusable. Imagine a lab where researchers need three approvals and biometric scans just to access public datasets. They’ll find workarounds—like emailing data to personal accounts. That increases risk. Balance matters.

Frequently Asked Questions

Can a system have all 5 aims perfectly achieved?

No system achieves all five aims perfectly. Trade-offs are inevitable. Encrypting everything (confidentiality) can slow access (availability). Requiring multiple authentications (authenticity) frustrates users, leading to shadow IT. Perfection is a myth. The goal is acceptable risk.

Is non-repudiation only relevant in legal contexts?

Not at all. It’s critical in finance, healthcare, and supply chains. When a pharmacist dispenses controlled medication, non-repudiation ensures the prescription was authorized. In logistics, blockchain-based non-repudiation tracks cargo handoffs across borders. It’s not just about courtrooms—it’s about trust in transactions.

How do these aims apply to personal security?

They do. Use a password manager (confidentiality). Enable auto-updates to patch vulnerabilities (integrity). Backup your photos to the cloud (availability). Verify sender emails before clicking links (authenticity). Save chat logs for disputes (non-repudiation). These aren’t just for corporations. They’re life skills now.

The Bottom Line

The 5 aims of security—confidentiality, integrity, availability, authenticity, and non-repudiation—are not a checklist. They’re a framework. A guide. A way to ask better questions. What are we protecting? From whom? At what cost? Because the thing is, no amount of technology can eliminate risk. Humans make mistakes. Systems fail. Threats evolve. But by understanding these aims, we can make smarter choices. We can accept that 100% security is a fantasy, while still demanding better. That said, in a world where a single breach can unravel years of trust, aiming for something close isn’t just smart. It’s necessary.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.