CIA Triad

Armond Hardy

Professor Kirkpatrick

CYSE 200

21 September 2021

                                                                                 CIA Triad

           CIA triad is a known security model, that can guide a businesses’ efforts and polices to keep the organization’s information secure. The confidentiality, integrity, and availability of information is pivotal to the operation of a business, and the CIA triad segments these three ideas into separate focal points. This differentiation is helpful because it helps guide security teams as they search for the different ways in which they can prepare for and conquer each concern. The abbreviation CIA stands for credibility, integrity, and availability. You may wonder how this relates to business?

          Confidentiality means, only people who are authorized by the business should be able to access or change established data. For example, those who are in control of an organization’s finances should be able to access the spreadsheets, bank accounts, and any other information related to the flow of money and problematic situation within finances. However, the vast majority of other employees, and even some executives in the company may not be granted access. To ensure these policies are followed, and that there is no confusion.

          Secondly, integrity. Integrity means, Data should be stored in the proper state, so that it cannot be tampered with accidentally or intentionally. For example, if your company provides information about finances on your website, this information needs to have integrity, so it does not make the businesses unable to be trusted. Lastly, Availability. Availability means, authorized users should be able to access the data whenever necessary. For example, there is a power outage and there is no tragedy recovery system in place to help users recover access to critical systems, availability will be compromised.

           With CIA triad comes confidentiality, and the two terms normally used for this is authentication and authorization. Authentication, which encompasses processes that allows systems to determine if users are who they say they are. These include password, ID cards, etc. Authorization, which determines who has the right to access which data. This includes the people who the business grants access to the secure data.

(What is the CIA Triad and Why is it important? | Fortinet, 2021)

Fortinet. 2021. What is the CIA Triad and Why is it important? | Fortinet. [online] Available at: <https://www.fortinet.com/resources/cyberglossary/cia-triad> [Accessed 22 September 2021].

Leave a Reply

Your email address will not be published. Required fields are marked *