Defending Your Data
The CIA triad is a system composed of three key parts to help keep information safe.
The three parts are confidentiality, integrity and availability. These three elements help keep
data and information safe. Authentication is making sure a person matches their info they give
you and authorization is if you have permission to access certain information or tools.
CIA Triad
The CIA triad uses its three components to maximize the security of information in an
organization. The first component is confidentiality. This component is the first component that
comes to people’s mind when talking about keeping data safe but it has many aspects to it. A
prime example of an aspect of confidentiality is in online banking and requires a person to entire
their specific routing number and also two factor authentication.(Chai, 2022) The second
component is integrity. An example of integrity being used to protect data is organizations
setting up protocols and rules on who can edit the data so there isn’t any data that is leaked or
deleted because of mistakes. The final component of the CIA is availability. The reason why
availability is important is because if there is a cyberattack on your organization and you are
forced to shut down and limit the availability of data the organization or company will have to
stop all production.(Chai, 2022)
Authentication vs Authorization
Authentication is when you verify a person’s information or credential so they can
access their data. Typically you will see this when attempting to log in to many websites. The
most common form of authentication is the two factor authentication where once you put your
login information in the website that you are logged into may send a code to you phone number
or email to verify that it is you logging in. Authorization is the extent of information that you can
see based on your information. A prime example of this is with social media and if someone has
a private account and you do not follow them then you are authorized to see their
profile.(Weatherston, 2022)
Conclusion
To conclude, what I have learned from researching about these two connected topics is that
keeping your organization’s data safe is one of the most important aspects of any organization.
An organization must use and tailor all aspects of the CIA to their needs for optimal security.
References
Chai, W. (2022). What is the CIA Triad? Definition, Explanation and Examples.
TechTarget.
https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA
Weatherston, G. (2022, September 29). Authentication vs Authorization – What’s the
Difference? FreeCodeCamp.org.
https://www.freecodecamp.org/news/whats-the-difference-between-authentication-and-a
uthorisation/