1. What is the CIA Triad
What does the CIA Triade stand for, according to Chai (2022) in the article What is the CIA Triad? Definition, Explanation, Examples it is said that CIA Triad stands for “confidentiality, integrity, and availability” and that these three elements of the triad are “the most foundational and crucial cybersecurity necessities”.
2. The Three Key Concepts
Firstly, confidentiality is similar to privacy, the basis of confidentiality is to prevent sensitive information from being accessed by unauthorized individuals (Chai 2022). Secondly, integrity is important because its involvement is to maintain a confident measure of trust and accuracy of data over the life span of a company or user (Chai 2022). Lastly, availability is important because it ensures that information and data is to be readily accessible to the appropriate users (Chai 2022)
3. Confidentiality and Authentication
Authentication is a subject that fits into the concept of confidentiality (Riordan 2022). Authentication is at a basic level what determines who is attempting to access a network system or sensitive information (Riordan 2022). When it comes to sensitive information the authentication of a user is incredibly important because that is primarily how a digital program is able to tell if the appropriate person is the one who is supposed to be accessing the data that is trying to be accessed (Riordan 2022). In order to bypass authentication most systems will use credentials that will verify and prove to the system that the user is who they say they are (Riordan 2022).
4. Confidentiality and Authorization
Unlike authentication which tries to prove that the individual is the appropriate individual for accessing information, authorization is simply the system verifying that one is allowed to be accessing the information that is trying to be accessed (Riordan 2022). The main similarity is the authorization also is considered an element to the concept of confidentiality, but the biggest difference that the two have is that authentication if trying to understand who you are while authorization is ensuring that what is trying to be accessed is allowed to be accessed by the person attempting to access it (Riordan 2022).
5. An Example of Both Authentication and Authorization
The best example that comes to mind is when an individual is trying to log into an account. The initial username and password that one must put in to access their account would be considered the authorization element of the confidential process of accessing an account. The correct username and password would result in the system understanding that the individual who knows and inputs the correct password is allowed access to the account and any information on the account, because of this it is important that one protects their passwords from anyone that they don’t want to be able to access the account information. Authentication is usually the second step in an account process because it typically makes the user physically accept an authentication response that allows the system to ensure that the correct person is the one who is logging into the account. Authentication can come in many different forms, but some common examples include a code sent to an email or text message, a call, or a manual button acceptance that is sent straight to the account holders’ device such as a Duo-Mobile notification.
References
Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples. TechTarget. Retrieved February 22, 2025, from https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and availability- CIA?jr=on
Riordan, G. (2022, September 29). Authentication vs Authorization – What’s the Difference? FreeCodeCamp. Retrieved February 22, 2025, from https://www.freecodecamp.org/news/whats-the difference-between-authentication-and-authorisation/