The CIA is one of the top agencies that handles some of the most sensitive information in the world. This information can range from political, military, overseas and it’s all to protect national security. The CIA letters stand for Central Intelligence Agency, however within the CIA the letters also stand for Confidentiality, Integrity and availability and this is known as the CIA triad.
The “C” stands for confidentiality and it’s very important to protect people’s sensitive information. The data is usually categorized based on the amount of damage that could be done if it was leaked or fell into the wrong hands (Chai, 2022). The “I” stands for integrity and this means that the information of the data must remain the same and not changed. However, if the change of information is made by an authorized person, if it’s incorrect the information can be corrected (Chai, 2022). The “A” stands for availability, and this simply means that the information should be readily available to authorized persons (Chai, 2022).
The main purpose of the CIA triad is that it is the main foundation of developing security systems that play a major role in keeping data safe and protecting it from cyberattacks. Also, it’s a great way to help organizations stay compliant when there are complicated regulations involved.
What is authentication and authorization? Authentication is a process that helps to verify who you are. There is technology that provides access to a person’s credentials to see if what they enter the system matches (Shacklett, 2021). One popular form of authentication is the user ID. Authentication is a process that verifies that someone or something is who they say they are. Technology systems typically use some form of authentication to secure access to an application or its data (Shacklett,2021). For example, when you need to access an online site or service, you usually must enter your username and password (Shacklett, 2021). Another form of authentication Is when you are using your mobile phone and a unique code is sent to your device. Biometric signature is very popular and that is where you’re facial or thumb print is used. This typically happens when using a mobile device. The importance of authentication is to help organizations make sure that the people trying to access their protected networks and databases are properly identified.
Authorization is simply when an administrator grants you access to those resources. However, depending on the information and the level of security will determine whether you gain access or not. An example would be someone who may help with human resources. Well, there are several different areas that you may be granted access to or not. Some access may be granted to allow you to input personal information only. However, there may be other authorization that allows you to input salary information.
In today’s society and with all of the cyber attacks and hacking into different systems to steal identities and personal information it is important to try to keep your data safe by using protective technology. Using processes and following guidelines is imperative to help organizations remain compliant and following regulations that are necessary to continuously strengthen and improve processes and systems.