The CIA Triad

Corey Parker

9/26/2020

The CIA Triad

The CIA Triad are the three vital principles of any secure network. Not to be mistaken with the Central Intelligence Agency, CIA stands for Confidentiality, Integrity, and Accessibility. If there is ever an information security breach it can ALWAYS be traced back to one or more of these 3 concepts.

Confidentiality:

Confidentiality means limiting the access of information to those who are authorized and/or authenticated to do so (Fruhlinger, 2020).

  • Authorization lets us choose who has access to what information. It is important to keep information on a need-to-know basis I order to prevent data breaches. If an intern at an IT company were to be given an account with administrative control, he would have access to way more information than necessary. This opens the possibility of the intern doing things such as – remoting into client’s computers, discovering client’s passwords, deleting important data, and etc. To prevent this, we must limit people to the LEAST amount of information as possible, while still allowing them to do the tasks that are necessary.
  • Authentication allows us to verify if a user is who they say they are (Fruhlinger, 2020). Examples of authentication would be – password protection, biometric scanners (scanners that identify users based on fingerprints, iris patterns, facial features, and more), keycards, etc. (Biometric Security Systems, 2020)

Integrity

Integrity is the functionality of the data. We must have complete data that is authentic, accurate, and dependable (Walkowski, 2019). If someone were to host a banking service, users of the service would want their account balances to be accurate and consistent. Otherwise the service would not be successful and the web users would search for an alternative.

Availability

Without availability, information and machines would be practically useless. What is the point of owning a device if you cannot log on to it? What is the point of having a hard drive full of photographs if the pictures are not available? Common occurrences that put availably at risk are user errors, power failures, and DDOS attacks or denial-of-service attacks (Walkowski, 2019).

DDOS attacks are done by overloading a network or machine with packets of information until it eventually goes down. Ways to prevent these availability failures from occurring are regular updates to systems, keeping information backed up, tracking bandwidth usage, and having backup hardware for if the network or machine goes down (Fruhlinger, 2020).

Works Cited

  • Fruhlinger, J. (2020). The CIA triad.
  • Walkowski, D. (2019, July 09). What Is The CIA Triad? Retrieved September 27, 2020,

Leave a Reply

Your email address will not be published. Required fields are marked *