Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • TX-RAMP
  • Contact Us
search
clear

Current Newsletters

  • May 2023 Newsletter

    May 2023 Gatekeepers: The guardians of data

  • April 2023 Newsletter

    April 2023 Internet of Hackable Things

  • March 2023 Newsletter

    March 2023 Security Awareness and Culture

  • February 2023 Newsletter

    February 2023 Understanding the insider threat

The Rule of Three

August 2018

The Rule of Three

The number three surrounds us. We find it in mathematics and science. Only three primary colors are needed to mix most other colors (red, yellow, blue). The three-act structure is the predominant model used in screenwriting (the setup, the confrontation, the resolution).

This aptly named “Rule of Three” represents a big part of how we think, make sense of, and cluster information. In this month’s issue, we highlight that core human trait to demonstrate how triads help people understand and visualize security awareness.

  1. What does CIA stand for? (Confidentiality, Integrity, Availability)
  2. Personal, Professional, and Mobile combine to make this security triad. (Many Lives Triad)
  3. What are the three elements of the Domains Triad? (Cyber, Physical, People)
  4. Every organization needs to consider these three fundamental components when creating a successful culture of security. (Processes, People, and Technology)
  5. You receive a text message warning you that your bank account has been locked due to fraudulent activity and instructs you to click on a link to fix it. his is likely an example what kind of social engineering attack? (Smishing or SMS Phishing)

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster