Authentication and Authorization The CIA Triad

The “CIA” in CIA Triad is an acronym for “Confidentiality, integrity, and availability not to
mistake that for the actual CIA, the Triad is often called the AIC (Chai 1).” It is a “model that is
designed to guide policies for information security within an organization (Chai 1).”
Confidentiality:
Measures are designed to prevent sensitive information from unauthorized access attempts (Chai
1).”
Integrity:
“Involves maintaining the consistency, accuracy and trustworthiness of data over its entire
lifecycle (Chai 1).”
Availability:
“Information should be consistently and readily accessible for authorized parties (Chai 2).”
Authentication:
“Verifies who the user is by using a password, biometric information, etc… It is also visible and
changeable by the user to some extent (“Authentication Vs Authorization”).”
Example:
“By verifying their identity, employees can gain access to a human resources (HR) application
that includes their personal pay information, vacation time, and 401K data (“Authentication Vs
Authorization”)”.
Authorization:
“Determines the resources the user can access (“Authentication Vs Authorization”).” “Often
maintained and implemented through an organization It is neither visible nor changeable by the
user (“Authentication Vs Authorization”).”
Example:
“Once their level of access is authorized, employees and HR managers can access different levels
of data based on the permissions set by the organization (“Authentication Vs Authorization”).”

Citations
https://www.sailpoint.com/identity-library/difference-between-authentication-and-a
uthorization/
What is the CIA Triad? Definition,Explanation, Examples. By Wesley Chai Chai
Article (Links to an external site.),

Leave a Reply

Your email address will not be published. Required fields are marked *