Evan Potts
4/22/2023
IT200T
Professor Duvall
Instructions
Using the Chai Article (Links to an external site.), along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication & Authorization, including an example.
What is the CIA Triad?
CIA Triad stands for Confidentiality, integrity, and availability sometimes referred to as the AID Triad. Those three principles are the foundation of an organization’s security infrastructure. Though experts believe it needs to be constantly upgraded to remain effective. Confidentiality prevents sensitive information from being leaked by unauthorized networks. Countermeasures to protect confidentiality include data classification, strong access controls, encryption of data in the process, and training for individuals with access to data. Integrity relates to the strength of the data, how accurate it is, how it holds up for the future, and how reliable it is. Good integrity involves protecting the data in us by making sure it is safely moved in transit, or how it is stored. Availability means everything that is supposed to be up, and running is doing such. It allows authorized users to have reliable access to their data 24/7. To reinforce availability regular software patching, backups, recovery plans, and upgrades should be installed.
The differences between Authentication & Authorization
Authentication is the way of verifying a user so they can access the system’s data, and on the other hand Authorization is what determines the user’s rights to access the specific data system they belong to.
CIA Triad Example
Google Email access you can set up an Email and have confidentiality on your passwords, phone number, and any sensitive information that could get stolen from you google is required to protect it with integrity, which means all your information is in safekeeping and it’s the email providers responsibility to ensure that and make sure it has availability 24/7. You can also have two-factor authentication to ensure that your account is extra safe and you are the only one able to have authorized access to this information.
Cited Sources
Fruhlinger, Josh. “The CIA Triad: Definition, Components and Examples.” CSO Online, CSO, 10 Feb. 2020, https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html.