{"id":305,"date":"2026-02-22T23:37:00","date_gmt":"2026-02-22T23:37:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-flowers\/?p=305"},"modified":"2026-04-29T17:40:03","modified_gmt":"2026-04-29T17:40:03","slug":"cia-triad-difference-between-authentication-and-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/22\/cia-triad-difference-between-authentication-and-authorization\/","title":{"rendered":"CIA-Triad: Difference between Authentication and Authorization"},"content":{"rendered":"\n<p class=\"has-text-align-center\">David Flowers<br>Department of video game development and design, Old Dominion University<br>CYSE-200: Cybersecurity, Technology &amp; Society<br>Dr. Christopher Bowman<br>February 22, 2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">What is the CIA Triad<\/h2>\n\n\n\n<p>Authentication and Authorization is a component of the CIA triad, thus it is important to<br>understand the triad. The CIA Triad stands for Confidentiality, Integrity, and Availability.<br>Confidentiality is about how well information is protected. This means that many measures are<br>taken into account to ensure that no one can break into a place physical or digital to steal data,<br>and This is seen in the Chai article when it is stated by Chai (2022) \u201cConfidentiality measures<br>are designed to prevent sensitive information from unauthorized access attempts.\u201d(p.1). Integrity<br>means ensuring the trustworthiness of information. This includes when information is being<br>moved or transferred and this information must not be altered by third parties that do not have<br>the proper authorization Chai (2022) \u201cData must not be changed in transit, and steps must be<br>taken to ensure data cannot be altered by unauthorized people.\u201d(p.2). Availability represents the<br>ability to allow authorized people to have access easily whenever they request to view the<br>information. Availability also covers ensuring that hardware and software are up to standard so<br>then they won&#8217;t fail to bring forth information Chai (2022) \u201cThis involves properly maintaining<br>hardware and technical infrastructure and systems that hold and display the information.\u201d(p.2).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Authentication vs Authorization<\/h2>\n\n\n\n<p>Authentication and Authorization can be seen as really similar in concept. In use they are<br>two completely different subjects that are important to securing information to ensure that<br>unauthorized personals do not have access to it. First off Authentication is mainly about<br>confirming that someone is who they say they are. This can be done with passwords, codes, two<br>factor authentication, and other forms of authentication Kosinski (2025) \u201cthe Authentication<br>process relies on credentials, such as passwords or fingerprint scans, that users present to prove<br>they are who they claim to be\u201d. An example of Authentication is logging into google and you<br>prove who you are to google by entering your gmail account and password. Authorization is built<br>upon user power and their ability to have access to certain information\/data or be able to change<br>certain information\/data. This also extends to online networks and resources as stated from IBM<br>Kozinski (2025) \u201cThe authorization process relies on user permissions that outline what each<br>user can do within a particular resource or network\u201d. An example of Authorization is a person<br>can have a lower level authorization and be allowed to know that coffee can taste better with<br>milk, but a person with a higher level authorization will be allowed to know that almost all<br>preground coffee is crushed and mixed with cockroaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Conclusion<\/h2>\n\n\n\n<p>To reiterate the CIA triad is a major part of security and Authentication and Authorization<br>are a component of the triad. The CIA triad stands for Confidentiality, Integrity, and Availability.<br>Authentication is about identifying that a user claims who they are. Authorization is built around<br>the concept that users have different levels of permissions, thus each user should only have<br>access to what they have access to.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">References<\/h2>\n\n\n\n<p>Chai, W. (n.d.). What is the CIA triad_ definition, explanation, examples &#8211; techtarget.pdf. Google<br>Drive. https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/p>\n\n\n\n<p><br>Kosinski, M. (2025, November 17). Authentication vs. authorization: What\u2019s the difference?<br>IBM. https:\/\/www.ibm.com\/think\/topics\/authentication-vs-authorization<\/p>\n","protected":false},"excerpt":{"rendered":"<p>David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology &amp; SocietyDr. Christopher BowmanFebruary 22, 2026 What is the CIA Triad Authentication and Authorization is a component of the CIA triad, thus it is important tounderstand the triad. The CIA Triad stands for Confidentiality, Integrity, and Availability.Confidentiality is about how well information&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/22\/cia-triad-difference-between-authentication-and-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":31890,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/users\/31890"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/305\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}