The CIA Triad

This write-up will identify what the CIA triad is with respect to Cybersecurity. The difference between Authentication and Authorization within the CIA triad will be identified by examples and research related to the topic.

What is the CIA Triad?
CIA stands for Confidentiality, Integrity, and Availability with respect to the field of Cybersecurity. The idea embodies a model for protecting and securing information systems. Each of these principles outlines an idea for protecting sensitive data for companies, individuals, and governments. We may have all practiced these principles in our daily routines when we update passwords, run virus scans, and control access to our home computers.


What is Confidentiality?
Confidentiality controls the way we access certain types of files and data. We might try things like encryption on our documents and emails. We can also utilize examples such as two-factor authentication to verify identity.


What is Integrity?
When we download a file or send encrypted documents, we utilize integrity to verify that the information is authentic and not tampered with when we receive it. Tools such as hash calculators can be utilized to show the integrity of the data through downloads. This is an important aspect of our security that prevents data corruption and ensures that the information is accurate.


What is Availability?
Availability is the assurance that when we need to access a system or certain types of information, it will be accessible. All this can be exemplified when you think about how we access programs like Canvas or our school website to either complete assignments or manage our student account.


In Conclusion
The difference between Authentication and authorization within the CIA triad is that authentication will utilize passwords, tokens, and security questions to verify that the person trying to access that system is who they say they are. Authorization utilizes these passwords, tokens, and certificates to give that person certain privileges to the system based on their preassigned settings.


References
Tahir. (2024, September). Introduction to CIA Triad. Medium. https://medium.com/@tahirbalarabe2/introduction-to-cia-triad-0db444793297
What is the CIA Triad_ Definition, Explanation, Examples – TechTarget.pdf. (n.d.). Google Docs. https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view?pli=1

Leave a Reply

Your email address will not be published. Required fields are marked *