The CIA Triad stands for Confidentiality, Integrity, and Availability. These are three key
concepts that make up a model for information security within an organization. Confidentiality
being privacy, so for example keeping sensitive information secret and unauthorized. Integrity
would be maintaining consistency and trustworthiness of data and systems. For example, you
wouldn’t want a bunch of random windows and Linux machines, you would want consistent
windows machines or Linux machines. Availability is making sure information stays up and is
healthy. For example, it is always important to keep your servers for your website up so
customers can access that website. authorization and authentication are very similar in that they
fill out the same role as they are processes that are used to protect sensitive and vital
information. The key difference is authentication verifies the identity of a user to make sure they
are real. While authorization determines the access to data the user has, for example, IT may
have access to important information on systems like routers and computers. But a janitor would
not have access to that.