Jamal Hairston
9/17/22
The CIA Triad
The triad model is a well-known information security approach that can help an organization protect its data and I think all companies should follow this outline.
What is the CIA triad?
The CIA triad is an outline designed to guide information security inside an organization. The CIA comprises three core principles: Confidentiality, Integrity, and availability. Confidentiality is one of the three principles in the CIA Triad: “Only authorized users and processes should be able to access or modify data” Josh Fruhlinger stated in his article. Integrity is the promise that the data is reliable and correct. Lastly, Availability is an assurance that information will only be accessed by those who are allowed to.
Importance of the CIA triad
The three core principles(Confidentiality, Integrity, and Availability) work together to make a strong foundation for cybersecurity in organizations. Using these three principles can help guide the progress of security policies in companies. The trio aids organizations in asking targeted questions about how value is being supplied in those three crucial areas when assessing needs and use cases for prospective new goods and technology.
Confidentiality, Integrity, Availability
Special training may be required for those who have access to sensitive documents in order to protect data confidentiality. Authorized individuals can benefit from training to become more familiar with risk factors and preventative measures. Maintaining a perfectly functional operating system environment free of software conflicts and making hardware repairs as soon as they become necessary are all ways to assure availability. Additionally, it’s critical to stay up to date on all required system upgrades. Lastly, Integrity is the measure of permission and user access control. Version control has the ability to stop authorized users from making mistakes or accidentally deleting things. Organizations must also provide some method for detecting any data changes that can happen from inhuman circumstances.
Conclusion Of the CIA triad
In conclusion, there are many benefits to using this outline and there’s a reason why it’s known throughout the world in the field of cyber security
N/A, F. (2022). What is the CIA triad and why is it important? Fortinet. Retrieved September 18, 2022, from https://www.fortinet.com/resources/cyberglossary/cia-triad#:~:text=The%20three%20letters%20in%20%22CIA,and%20methods%20for%20creating%20solutions.
Chai, W. (2022). What is the CIA triad_ definition, explanation, examples – techtarget.pdf. Google Drive. Retrieved September 18, 2022, from https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view?usp=sharing