The CIA Triad

What is The CIA Triad?

The security, accuracy, and accessibility of personnel information is the number one thing that people and organizations find important. The CIA triad was made to insure this outcome with authentication and authorization.

Confidentiality

This is the part of the triad that “is roughly equivalent to privacy” ( Wesley, 2022). The main goal of confidentiality is to secure personal information from people that aren’t allowed access. The amount of security depends on the organization and how important their information they have is. There are “methods used to ensure confidentiality is requiring an account number or routing number when banking online” (Wesley, 2022)

Integrity

Integrity is implemented so people cannot just go in and change your personal information. This is done by adding a layer of permission to access control. This also helps to detect change of things “that might occur as a result of non-human-caused events such as an electromagnetic pulse” (Wesley, 2022). EMP’s may cause many different changes that may end up in deleting important information of organizations.

Availability

This is to make sure that the information being secured is accessible whenever wherever. The hardware must be maintained somewhere that can be reached quickly in case of emergency. This system is also kept well updated to keep away from all types of new conflicts. For quick access “a backup copy may be stored in a geographically isolated location” (Wesley, 2022). This allows them to have a personal surveillance team to keep any conflicts out. 

Authentication Vs. Authorization

Authentication and authorization are similar but have very minor differences. To be exact “authentication process relies on credentials” (Kosinski, 2025). This includes the use of two step verification, passwords, finger print scans, and more. This is to allow evidence that the user is who is actually allowed to access the information being secured. Authorization is a little different. It is based on the user’s permission. This means, “policies that detail what a user can access and what they can do with that access in a system” Kosiniski, 2025). This is put into effect to make sure the information is only accessed by users that are more important.

Conclusion

The confidentiality, integrity, and availability of the triad is what keeps organizations and people secure of personal information being breached. This is put into check with the help of the authentication and authorization process.

References

Wesley, Chai “What is the CIA Triad_ Definition, Explanation, Examples – TechTarget.pdf.” 28 June 2022,What is the CIA Triad_ Definition, Explanation, Examples – TechTarget.pdf

Kosinski, Matthew. “Authentication vs authorization.” Authentication vs. authorization: What’s the difference?, 15 Apr. 2025, www.ibm.com/think/topics/authentication-vs-authorization?utm_source=chatgpt.com.

Leave a Reply

Your email address will not be published. Required fields are marked *