Name: Johnny Alvarado
Date: September 14, 2024
How the CIA Triad Relates to Authentication and Authorization
The CIA Triad is the basic concept for security in the information technology
world. It consists of Confidentiality, Integrity, and Availability. It can also be used to
create policies on how to handle security in case of a cyberattack. The CIA Triad can
connect with Authentication and Authorization by being careful about who can access
certain security systems.
Authentication
One of the concepts from the CIA Triad, Confidentiality, strongly relates to
authentication. One example that is commonly used for basic cybersecurity measures is
the usage of two-factor authentication and encryption. Chai (2022), elaborates that data
encryption and two-factor authentication are common methods of ensuring
confidentiality (pg. 3).
Authorization
Integrity, which is a concept from the CIA Triad, relates to authorization because
it’s all about honesty and having morals. Cybersecurity professionals have special access
to security systems and other crucial information that others may not have access to at
all. “This step is important for implementing protection guidelines and controlling
access within the system, thereby stopping unauthorized activities” (Difference Between
Authentication and Authorization, 2024).
Conclusion
This shows that the CIA Triad strongly connects to how Authentication and
Authorization work. Confidentiality and Integrity are both critical for authentication
and authorization, as they are both meant to secure systems and information. The CIA
Triad is meant to outline security policies for an organization to secure its systems
better. Because of these reasons, there are many possibilities for strengthening our
security systems and procedures in case of a cyberattack.
References
Chai, W. (2022, June 26). What is the CIA Triad? Definition, Explanation, Examples.
https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-ava
ilability-CIA?jr=on.
2024, July 2024. Difference Between Authentication and Authorization.
https://www.geeksforgeeks.org/difference-between-authentication-and-authoriz
ation/