Name: Angel Drake
Date: 02.23.2025
The CIA Triad
Informational protection in business starts with confidentiality, integrity, and availability, which is the CIA triad; it protects information from unauthorized users, has accurate information, and is accessible to users. Beneficial to businesses is understanding that Authentication is the verification of your identity, and authorization is the level of access someone or a system is granted.
Introduction to CIA Triad
Developing security in business is important and starts with confidentiality, integrity, availability, or the CIA Triad. On their own, these beliefs are beneficial to any institution, but together, they address issues and create solutions for information security. Confidentiality is about keeping sensitive information secure from unauthorized users. Integrity is to show how your data can be dependable and trustworthy, so it needs to be accurate. Finally, availability is about the functionality of your system and how authorized people need to be able to access it at any time.
Authentication vs. Authorization
The concepts of authorization and authentication can be confused due to them being closely related to controlling access to a system, but they operate on completely different levels. Authorization involves verifying an individual and granting them access to a resource, while authentication involves confirming that the individual is indeed who they claim to be. Authorization establishes the permissible level of access for the individual, following authentication. Authentication precedes the verification of your identity, typically based on a username and password.
Conclusion
Understanding how confidentiality, integrity, and availability work together to protect sensitive data, create consistent and accurate data, and improve a business’s information security is essential. Also, identifying the difference between authentication and authorization is important. Understanding authorization involves determining the permissible level of access, while authentication involves verifying the identity of the person or system. Understanding these concepts helps you understand security and unauthorized access in systems.
References
What is the CIA triad and why is it important?. Fortinet. (n.d.). https://www.fortinet.com/resources/cyberglossary/cia-triad
GeeksforGeeks. (2024, July 24). Difference between authentication and authorization. https://www.geeksforgeeks.org/difference-between-authentication-and-authorization/