Title:
The CIA Triad
Name:
Hector Gomez
Date:
September 20, 2021
Details:
The CIA Triad is a model in information security that was created to help evaluate how organizations can keep their data secure. CIA stands for confidentiality, integrity, availability. According to the Center for Internet Security, confidentiality means that “Data should not be accessed or read without authorization. It ensures that only authorized parties have access. Attacks against Confidentiality are disclosure attacks.” Integrity means the data should not be changed or tampered with at all. The Fruhlinger article states that availability means “Authorized users should be able to access data whenever they need to do so.” The CIA Triad is important because it is the center of the development of security systems and policies for all organizations. It helps to keep data safe and when you go against cyber threats. There are two main things that help with restricting access to data, which are Authorization and Authentication. Authorization is things such as passwords and face ID, which allows systems to identify the user. Authentication is who has the right to access certain information. For example, if you were to get hacked and there is personal information on your files, authentication helps because there could be another access point to that certain information that only you can access. Those two A’s fall under confidentiality. Which is very important within the Cyberworld. Nowadays if you don’t have a password or do not have multiple ways of protection to access your information, your information could be compromised. Hacking is very common in these recent years. People do it for multiple reasons which is why we need to continue to develop things within the cybersecurity world and keep our information safe. That’s why the CIA Triad is very important. It is something we use every day for our phones, social media accounts, banking accounts, etc. for protection.
References:
Election security spotlight – cia triad. CIS. (2021, June 15). Retrieved September 21, 2021, from https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/.
Unitrends, & uptime, A. U. U. increases. (2021, May 6). The CIA triad and its importance in data security. Unitrends. Retrieved September 21, 2021, from https://www.unitrends.com/blog/cia-triad-confidentiality-integrity-availability.
Fruhlinger, J. (2020, February 10). The CIA Triad: DEFINITION, components and examples. CSO Online. Retrieved September 21, 2021, from https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html.