Write-Up The CIA Triad – CYSE 200T

Celeste Meraz-Luna
Charles E. Kirkpatrick
CYSE200T 25962
Feb 2, 2025


The CIA Triad

The CIA triad represents confidentiality, integrity and availability. The model is designed to guide polices for information technology and is considered the most foundational and crucial cybersecurity need. Confidentiality are rules that set limits to access data, integrity assures the data is accurate and availability guarantees the data is accessible by the authorized users. Authentication verifies users and authorization allows users to access data.


Introduction
The CIA triad contains important concepts within the information security field. The three principles together create a framework that is designed to guide polices for information technology. As well as authorization and authentication, proving a crucial topic that is associated with the internet as a key component to the service infrastructure. This paper will explore the values of the CIA triad and the difference between authentication and authorization.


The CIA Triad
The CIA triad represents confidentiality, integrity and availability. The model, with the three principles together is designed to create a framework to guide polices for information technology. It is considered the most foundational and crucial cybersecurity need and contains important concepts within the information security field. It also provides a simple and complete checklist for evaluating an organization’s security.
Confidentiality is basically privacy. These are measures that are designed to prevent sensitive information from unauthorized access. It limits access to individuals within the organization and only allows authorized individuals. Integrity guarantees the practice of the data being trustworthy and accurate. Data should not be modified during transmission and actions are taken to ensure the data cannot be altered by unauthorized individuals. This allows the recipient to receive valid information. Availability of information is consistently and readily accessible for authorized individuals and parties. It also includes the maintaining of hardware and software to protect data from malicious acts that stop data from becoming available.


Authentication vs. Authorization
Authentication and authorization prove a crucial topic that is associated with the internet as a key component to the service infrastructure. Authentication is the method of verifying the identity of an individual or system to ensure they are who they claim to be. Authorization is the method of granting permission to an individual or system and specifying the assets they are able to access and actions they can carry out.
In the authentication process, the identity of individuals is checked to access the system or information while in the authentication process, the individual’s authorities are checked to access the resource. An example of authentication is when students log into their school account and the system sends them a two-factor authentication. At ODU, they use the application called “Duo Mobile.” An example of authorization is what students can access on the canvas. Professors remove links on the course that students cannot access.


Conclusion
The CIA triad represents confidentiality, integrity and availability and contains important concepts within the information security field. It also provides a simple and complete checklist for evaluating an organization’s security. Authentication and authorization prove a crucial topic that is associated with the internet as a key component to the service infrastructure. Authentication verifies users and authorization allows users to access data. The CIA triad, authorization and authentication are essential components to information security and provide important guidance to a secure environment.

Leave a Reply

Your email address will not be published. Required fields are marked *