The Yo-Yo Attack: Bankrupting Cloud Infrastructure
A comprehensive guide to the Yo-Yo attack, an Economic Denial of Sustainability (EDoS) technique that targets auto-scaling mechanisms in cloud environments.
Feb 28, 2026Cybersecurity
The CIA Triad—which stands for Confidentiality, Integrity, and Availability—is the foundation of modern information security. Every security control, policy, and mechanism ultimately seeks to address one or more of these three principles. Understanding the CIA Triad helps organizations and individuals protect sensitive information, maintain trust, and ensure operational resilience.
Confidentiality ensures that information is only accessible to authorized individuals. Protecting confidentiality means preventing unauthorized disclosure of data.
Example: Healthcare organizations use strict access controls so only doctors and authorized staff can view patient records.
Integrity ensures that information remains accurate, complete, and unaltered during storage, processing, and transmission. Any unauthorized modification, whether intentional or accidental, undermines trust in the data.
Example: Banks use hashing and transaction validation to ensure that financial records are not tampered with during processing.
Availability ensures that information and systems are accessible to authorized users when needed. Even the most secure data is useless if it cannot be accessed in a timely manner.
Example: Cloud service providers build redundancy into their infrastructure so users can access services without interruption.
| Principle | Goal | Common Methods | Example Use Case |
|---|---|---|---|
| Confidentiality | Keep information private | Encryption, MFA, access control | Doctors accessing patient records |
| Integrity | Ensure accuracy & trust | Hashing, digital signatures, audit logs | Banks validating transaction records |
| Availability | Maintain accessibility | Backups, load balancing, disaster recovery | Cloud providers ensuring service uptime |
The CIA Triad is not just theoretical—it's a practical model for designing security policies and controls. A weakness in any one area can compromise the entire system:
The CIA Triad provides a simple yet powerful framework for understanding and implementing information security. By prioritizing Confidentiality, Integrity, and Availability, organizations can build resilient systems that protect data, maintain trust, and ensure continuity of operations.
Love it? Share this article: