{"id":300,"date":"2025-02-16T21:52:33","date_gmt":"2025-02-16T21:52:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/derrickamissah\/?p=300"},"modified":"2025-02-16T21:52:33","modified_gmt":"2025-02-16T21:52:33","slug":"understanding-the-cia-triad-and-the-differences-between-authentication-authorization-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/derrickamissah\/2025\/02\/16\/understanding-the-cia-triad-and-the-differences-between-authentication-authorization-2\/","title":{"rendered":"Understanding the CIA Triad and the Differences Between Authentication &amp; Authorization"},"content":{"rendered":"\n<p>Understanding the CIA Triad and the Differences Between<br>Authentication &amp; Authorization<br>This paper gives an overview of the CIA Triad foundational model in cybersecurity and<br>explains, with examples, the difference between authentication and authorization.<\/p>\n\n\n\n<p><br>Introduction<br>It all begins with setting rules based on three key goals in cybersecurity: keeping<br>information confidential, ensuring its integrity, and making sure it\u2019s available, also known<br>as the CIA triad. To protect systems from unauthorized access, it\u2019s important to know the<br>difference between authentication (proving who you are) and authorization (deciding what<br>you\u2019re allowed to do). This helps in creating strong access controls to keep data safe.<\/p>\n\n\n\n<p><br>CIA TRIAD<br>This triad presents three basic requirements for information to be secured using the<br>following triad:<br>Confidentiality: This principle focuses on ensuring that sensitive information is accessible<br>only to those with proper authorization. Techniques like data encryption, strong password<br>protocols, two-factor authentication, and biometric verification help maintain<br>confidentiality. For example, online banking systems require account numbers and<br>passwords to restrict unauthorized access (Chai, 2022).<\/p>\n\n\n\n<p><br>Integrity: The Integrity property assures accuracy and dependability of the data during its<br>whole life cycle. It should be made that the data is protected against unauthorized<br>alternations; protective measures can involve checksum, signature, even version control.<br>Example: Something like downloading a software application where authenticity is<br>checked by applying cryptographic hashes.<\/p>\n\n\n\n<p><br>Availability: Through availability, information and resources are accessible to authorized<br>users when required. It is achieved through regular system maintenance, redundancy,<br>failover mechanisms, and sound disaster recovery plans. Cloud service providers, forexample, deploy multiple redundant servers to ensure that minimal time is wasted in case<br>of hardware failure (Chai, 2022).<\/p>\n\n\n\n<p><br>Differences Between Authentication and Authorization<br>Authentication is the process of identifying a person. It might be through password,<br>security token, biometric, or other multi-factor methods. For example, accessing an e-mail<br>account using username and password authenticates the identity of a user.<br>Authorization: Authorization is the process of determining what actions an authenticated<br>user can perform. It is a process after authentication that allows different types of actions<br>based on user roles. For example, an employee logging onto the corporate network would<br>have permission to access only certain files relevant to his department while others are not<br>accessible.<\/p>\n\n\n\n<p><br>Example: Consider a secure office building:<br>Authentication: The security guard checks your ID badge to verify you are an employee.<br>Authorization: Once inside, your access card only allows entry to floors and rooms of your<br>department.<\/p>\n\n\n\n<p><br>Conclusion: The CIA Triad consists of confidentiality, integrity, and availability as the<br>backbone of cybersecurity practices. Similarly important is the knowledge of the<br>difference between authentication and authorization to implement secure yet efficient<br>access control in systems.<\/p>\n\n\n\n<p><br>References<br>Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation,<br>Examples.file:\/\/\/Users\/derrickamissah\/Downloads\/What%20is%20the%20CIA%20Triad_<br>%20Definition,%20Explanation,%20Examples%20-%20TechTarget.pdf<br><br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the CIA Triad and the Differences BetweenAuthentication &amp; AuthorizationThis paper gives an overview of the CIA Triad foundational model in cybersecurity andexplains, with examples, the difference between authentication and authorization. IntroductionIt all begins with setting rules based on three key goals in cybersecurity: keepinginformation confidential, ensuring its integrity, and making sure it\u2019s available, also&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/2025\/02\/16\/understanding-the-cia-triad-and-the-differences-between-authentication-authorization-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30656,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/users\/30656"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/posts\/300\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}