The CIA Triad is arguably one of the most important concepts to grasp in cyber security. The triangular-like model is simply designed to guide policies within an organization. The three very important concepts in the triad are confidentiality, integrity, and availability. Triad formed over time, there was presumably no specific establishment, birth date or what have you. Furthermore, it has no set creator. The first letter in the CIA Triad stands for the aspect of confidentiality. Confidentiality focuses on who can access a certain system and piece of information. It protects valuable information from users who are unauthorized to access it. Let’s dig deeper into the phrase authorization a bit. In information security, authorization is the permission to access and view information. However, if you are unable to authenticate yourself to whatever system you are trying to gain access to, your permission to view confidential information is unquestionably nonexistent. Authentication is simply proving to the system that you are who you say you are. At times, an individual may run into a two step authentication to get into a database. For example, here at Old Dominion, we have to go through the two-step authentication to simply get into our portal. After we put in our username and password, a notification pops up to our personal device to make sure that it is us. If someone obtained our password then proceeded to login themselves, it would be a failed mission because they would not have the device to complete the second step of authentication. The next letter in the acronym accounts for integrity. Information integrity ensures that the information access cannot be edited or altered when users access it, if they are authorized to. Finally, the last part of the triad is, of course, availability. Availability is very important, information should be available whenever it is needed. To ensure availability, systems should be monitored and updated whenever needed.