The CIA triad is a common term referred to in the cybersecurity field. According to itgoverence.com it is used when talking about these three things: confidentiality, integrity, and availability (IT Governance, 2025). The CIA triad is typically used as a guide and design when implementing various security practices in different systems. In short, it makes sure systems stay protected, accurate, and readily accessible. This triad is very important to the cyber security field because it includes the three most important parts of security in a system (Chai, 2022).
Confidentiality means information in a system is protected via some type of protection method. Some examples are strong passwords, encryption, user authentication, etc. These methods ensure that any sensitive or confidential information in a system is protected from
people that are unauthorized or have bad intentions. This is a key part of any system and is necessary for any system with important information on it.
Integrity is the term used to describe if a system’s information is accurate. If a system has low integrity, its information has a high possibility of being inaccurate and vice versa for a system with high integrity. Integrity also refers to the data being complete and prone to any
deletion or tampering. This is a major competent for a system. Every single result or analysis is dependent on the information having high integrity. Without this not a single system would have trustworthy information.
Availability makes sure that every single part of a system is easily accessible when needed. This includes the system itself, the data, and any applications. This is important because it is very easy to focus on the confidentiality and integrity of a system and forget that the system
still needs to be accessible. Having good availability can prevent a lot of downtime, help the flow and continuity of business, and boosts productivity. The direct targeting of availability from DDoS attacks and various ransomware just puts an emphasis on how important availability is. Authentication and Authorization The combination of confidentiality, integrity, and availability is what makes the CIA triad so strong. However, there are two smaller components that are almost always taken into consideration when making systems. Authentication and authorization. These are very important to keep in mind when developing security in a system. Authentication is the verification process of whoever is trying to get into a system. Authorization on the other hand is what data a person has access to. These two things combined with the CIA triad make for a developed system with good security.
In summary the CIA triad consists of three key principles of security. Confidentiality, how protected a system is; integrity, how accurate a system’s data is; and availability, how
accessible a system and its data are. When it comes to authentication and authorization, the difference is authentication focuses on who is getting in and authorization focuses on what that person has access to. When a system includes the CIA triad with good authentication and authorization programs, the system will have great security practices. A perfect example of this is the ATM. The ATM has confidentiality through two factor authentication, integrity through accurately recorded records, and availability because it is accessible 24/7 (Gipson, 2023).