CIA Triad

One of an organizations most important aspect is their security. Similarly, to us
as individuals as well. We can break security into three main components. They are
Confidentiality, Integrity, and Availability. Also, known as the CIA Triad. When we break
security down into these three elements it lets use take a deeper dive on what is the
important. Confidentiality ensures that not everyone has access to private/restricted
information. An example would be using a strong password to ensure data is kept
secure
(Chai). Integrity refers to data is the way it should be and hasn’t been edited from
people who shouldn’t. Something like checksums would keep the maintenance of
integrity
of a business (Chai). Availability is that data should always be available when
requested. Performing hardware repairs and software updates ensures the availability
of
your business model (Chai). As an organization, you’re able to identify if the CIA Triad is
currently present in your security policies and if they are of strong value.
Authorization and authentication are important in protecting an organizations
network. It is the first step in choosing who has the access to the network. Authorization
is giving an individual the authority inside a physical or virtual space. Think of an ID card
that’s color coded depending on what floor or space you’re allowed into. Authentication
is the verification that you are who you say you are. Yes, you have this ID card but is it
truly yours. For example, you have the correct colored ID card, but you must also use
the keypad to access the room. Steps like these mitigate the compromise of protected
systems. “Authentication a user is paramount to user security” (National Library of
Medicine).
In conclusion, there are many ways for businesses and individuals to practice
security measures that prevent unnecessary travel through personal data. Of course,
these are just a basis of good conduct. I believe we are always evolving when it comes
to technology, but with the right foundations we can always build on top of it.
References
Hashemi-Pour, C., & Chai, W. (2023, December 21). What is the CIA triad
(confidentiality, integrity and availability)? WhatIs.
https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA
Trnka, M., Abdelfattah, A. S., Shrestha, A., Coffey, & Cerney, T. (2022, February 10).
Systematic Review of Authentication and Authorization Advancements for the Internet
of Things. National Library of Medicine.
https://pmc.ncbi.nlm.nih.gov/articles/PMC8963074/

Leave a Reply

Your email address will not be published. Required fields are marked *