According to the “What is the CIA Triad? Definition, Explanation, Examples” article by Wesley Chai, the CIA Triad stands for Confidentiality, integrity, and availability. The CIA Triad model was created to help organizations with their information security practices. (Chai, 2022) To assess your security protocols and equipment, the CIA triad offers a high-level, straightforward checklist. Confidentiality, integrity, and availability are the three requirements that a successful system meets. When any one of the three CIA triad components is absent from an information security system, it is insufficient.
The CIA security triad is also helpful in determining what went well and poorly following a negative incident. For example, the confidentiality of crucial data may have been preserved by the systems in place even while a ransomware or other malware attack hacked availability. It is possible to replicate effective policies and implementations and strengthen areas of weakness with the help of this data. (What is the CIA triad and why is it important? 2024)
Authentication and authorization have two different functions. Authentication is the process of validating a user’s identity, whereas authorization is the process of confirming their access to resources. According to autho.com, an example of these two different functions would be when going through security at an airport, you display your ID to prove your identity (Authentication). When you get to the gate, show your boarding card to the flight attendant so they can permit you to board and provide you entry to the plane (Authorization). (Auth0, 2024)
Resources:
Chai Article
https://www.fortinet.com/resources/cyberglossary/cia-triad
https://auth0.com/docs/get-started/identity-fundamentals/authentication-and-authorization