The CIA Triad

On a daily basis we’re required to provide personal details to gain access to sensitive data. These requirements are prompted when logging into bank a bank account or unlocking a phone, both options are secure practices to verify one’s identity. These steps can be repetitive at times, some may even say it’s overwhelming. However, it’s only obligation is to ensure the security of the individual. I often ask myself “Why are there so many steps required to access my information?” The general answer is for my own safety. Have you ever wondered who’s providing us with this security? Well, that would be the CIA Triad.

The purpose of the CIA Triad is to establish critical guidelines, policies, updates for data security. Confidentiality, Integrity and Availability are the three components structured around the CIA Triad and are imperative for cybersecurity needs. Ultimately, these precautions are beneficial because it was established to prevent unknown sources from gaining entry. The term Confidentiality is a form of privacy that stops sensitive information from being accessed. This is critical for Cybersecurity officials to ensure the data of a customer is defended. Integrity ensures that data is guarded from threats. Availability gives authorization which allows certified people to conduct specific security systems. For Example: “An IRS employee can access your sensitive information because they are considered a certified employee.”
Authentication needs personal information to access sensitive data.” Another example: “If you want to check your 401K, you may be required to use forms of verification such as a password and phone number.” Within the framework there are vital tasks that must be completed to maintain safety current measures. Therefore, the CIA Triad are constantly developing and advancing procedures.

~ (Henderson, 2023) The CIA triad’s application in businesses also requires regular
monitoring and updating of relevant information systems to minimize security
vulnerabilities, and to optimize the capabilities that support the CIA components.

Leave a Reply

Your email address will not be published. Required fields are marked *