The CIA Triad was developed in 1998 by Donn Parker is made up of three components: confidentiality, integrity, and availability. Confidently deals “authorized users and processes should be able to access or modify,” integrity deals with “data that should be maintained in a correct state, and nobody should be able to improperly modify it, either accidentally or maliciously and availability deals with authorized users should be able to access data whenever they need to do so.” This was created to ensure that any organization is going in the right direction and make sure that the organization is following the policies enforced with them. It enforces policies, but it also helps organizations with improving security measures and how the organizations should act when their cyber threats. Another model of security that Donn Parker created is Parkerian Hexad that adds three more principles: utility, possession of control, and authenticity. Possession of control deals with analyzing cyber threats and includes safeguards that protect organizations’ confidence, utility looks to improve operating systems with up-to-date technology, and authenticity deals with entrusting important information or credentials to someone.
Most importantly, it is known that this ensures that no information is compromised or stolen. This security model stands as the first line of defense against anyone who sought to commit cybercrimes against organizations. Now authentication deals with a user entering passwords to gain access to certain information like emails or files. For example, I would have to use my face recognition or fingerprint to get into my bank account app, phone, or email. Authorization is when you grant permission to access anything by the user, whether documents, files, or accounts.