In information security, there is a model that is used as a basis for security system development. This model is called the CIA Triad. CIA stands for Confientiality, Integrity, and Availability. Confidentiality is importnat in making sure that information from a company can only be accessed by authorized individuals. This helps to make sure no important or sensitive information can get out and cause any potential security risks or issues. An example of how to be confidential in a company would be to encrypt any sensitive information in an email so that only the recipient can access the information. A system must also have integrity in order to make sure that the accuracy and completion of information and processing is safely guarded in the company. This would help to make sure that no unnecessary modifications or data destruction happens. An example of how to use integrity is by using protection methods such as digital signatures to detect any potential tampering of a file. A system must also have availability. This would mean that a system would need to ensure that only authorized users can have access to information and assets when required. The goal of this step is to prevent any potential issues or disruptions from accessing and using data or information. An example of how to accomplish this by using backup systems to keep the website online during any potential system failures.
Within the talk of the CIA Triad, there is also the question of what is the difference between authentication and authorization. Well, authentication usually deals with the process of verifying a user is who they say they are instead of anybody potentially using their information to gain access to the system. This is used through how you would input a username and password whenever you log into an account. Authorization deals with determining what the authenticated personnel is allowed to do when they get access to the system. This is used in how after you log into your account, you are allowed access to specific settings but not to entire servers settings. Within these two, authentication comes before authorization. Overall, the CIA Triad provides a foundation on how to be able to properly develop your security systems. In the many sectors of the triad, it allows you to make your system confidential, integral, and available. In knowing all three, you can make sure that your system is as secure as possible.