The CIA Triad

The CIA Triad in Summary
Confidentiality, integrity, and availability are key functions of regulating a company’s information security and ensuring proper policies and regulations are being followed. These three topics are implemented together to create what is known as the CIA Triad. The CIA Triad had been in constant development over time due to the constant changing of organizational policy and the advancement of technology (Chai). With this being said, the CIA Triad has had many people implement their ideas to broaden and strengthen the three key components, confidentiality, integrity, and availability. Each of these holds their own weight in order to balance out a proper overall method of ensuring information security while constantly leaving room for improvement as technology advances. The CIA Triad has been in development since the mid 20th century when the ideas of security began to become more widely accepted (Chai).


Components of the CIA Triad (Confidentiality, Integrity, Availability)
The three components of the CIA Triad (confidentiality, integrity, and availability) are all very different in meaning and procedure, but work together to ensure the following of strong and efficient guidelines to ensure security. The idea of confidentiality is the security of sensitive and classified information from being accessed by individuals who are not granted access to information in the first place. Integrity is the idea of information having verisimilitude, not allowing the disturbance of credibility or a change of data. Availability allows for authorized individuals to access information in a punctual manner (Chai).


Authorization vs. Authentication
Authorization and authentication are both important concepts regarding the individuals within a system’s security. The process of authentication is set to verify individuals who are seeking to access information (authentication). On the other hand, authorization is the operation of verifying individuals and granting them access to information and systems. Both of these are crucial when it comes to ensuring a proper secure system (authentication).
The CIA Triad is composed of three concepts which are confidentiality, integrity, availability. These three principles are important as to setting proper security standards in order to keep a company’s classified information secure. Authorization and authentication play an important role in developing a process to make sure information is reliable while also making sure that the individuals needing to access the information are secured and granted proper permission.

References

1. “Authentication vs. Authorization: What’s the Difference?” OneLogin,
https://www.onelogin.com/learn/authentication-vs-authorization#:~:text=Authentication%
20and%20authorization%20are%20two,authorization%20determines%20their%20acces
s%20rights.

Leave a Reply

Your email address will not be published. Required fields are marked *