CIA in cybersecurity is an abbreviation for confidentiality, integrity, and availability. It’s a model that is designed to guide policies for information security within an organization. Confidentiality is a set of rules that limits the access of information. Integrity is the assurance that the information The CIA triad is also referred to as AIC triad, which is also availability, integrity, and confidentiality, to avoid any confusion with the Central Intelligence Agency.
What is the difference between Authorization and Authentication?
Authentication is the verification of a user or system’s identity meanwhile authorization gives the permission to access privileges that are granted to an authenticated identity. Authenticity protects against anyone trying to impersonate you and other types of identity fraud. There are some common techniques in order to establish your authenticity like authentication, biometric identification, and digital certificates. As long as they recognize who the person is, whether it’s to access a bank account, a phone, or anything that needs authorization in order to give you permission to access something, authorization and authentication are both required and necessary for everyday life.
CIA Triad Example
In 2020, Fruhlinger used an analogy of an automated teller machine where confidentiality is maintained by use of two-factor authentication with a debit card and a personal identification number, where it makes sure that it’s really you in order to proceed to access the bank account information. The ATM machine maintains the integrity through the connection to the bank network to make sure the changes from depositing or withdrawing money to be reflected in the accounts balance. The availability is done by having the ATM posted in different locations like outside a gas station or near any shopping centers. Another example is ODU. Us college students use canvas throughout the week and in order to sign into canvas, we need to authorize that the person signing into a specific account is us. In order to sign in, we type the username and password, although they might both be correct, there is an authorization stage where ODU sends a notification of someone trying to sign into your account and you can either approve or decline it. Once you hit approve, you are automatically accessed into the canvas account.
Conclusion
The CIA Triad is a security model that ensures and considers the three most important things about information security and how to guide the development of security policies for different organizations. This security model is used for potentially new pieces of technology and products that help organizations have and ask questions about how the value is being provided in those three key areas. The CIA triad may need more updates in order to stay effective and current within the years as technology advances throughout the years.