The Explanation of the CIA Triad
Definitions
• Confidentiality – protecting sensitive or private information from people without
access.
Example: When you are logging into your phone, there is a password or face ID
needed to open it.
• Integrity – keeping data accurate and making sure it is reliable and unchanged when
being sent.
Example: When applying for colleges your counselor transfers your transcript to
colleges, so your information is shown correctly.
• Availability – authorized users should be able to access the information whenever
they need to.
Example: Online shopping websites have backup servers for customers to continue
placing orders even when one is down.
Description of the CIA Triad
The CIA Triad is a practice that is used in cybersecurity to protect information systems. It is
based on three things. Confidentiality (maintaining the privacy of data), integrity
(maintaining the accuracy of data and it being unchanged), and availability (making data
accessible to authorized users whenever, wherever). These three principles are what help
keep the security of data and information safe. If one of them were to start weakening, the
entirety of the system could fail.
Differences and Examples of Authentication & Authorization
Authentication is verifying the identity of a user before access is allowed, while
authorization is what the user is able to access after being allowed to browse around.
Authentication Examples:
• Scanning your fingerprint
• Scanning for a Face ID
• A one-time verification code
Authorization Examples:
• Admin privileges
• Medical records
• Bank statements
Conclusion
In conclusion, the CIA Triad is a cybersecurity model used to protect information systems
with the principles being Confidentiality, Integrity, and Availability. Authentication is used to
verify the user’s identity, and authorization grants specific permission to private
information. When all this information is understood it creates the grounds for a secure
digital environment that can defend against cyber threats.