The CIA Triad and Authorization and Authentication Differences

​​Jared Peel​

​​Professor Kirkpatrick​

​​CYSE 200T​

​​September 14, 2025​



The CIA Triad and Authorization and Authentication Differences

The CIA Triad is made up of confidentiality, integrity, and availability. I will be explaining its importance to cybersecurity on how it builds the foundation of securing information. As well as how availability and authorization are crucial in their own aspects.

Confidentiality

“Confidentiality refers to privacy” (Chai 1). It’s made so crucial and vulnerable information does not get attempts from outside parties with unauthorized access. Data is often aligned with how important it is and what the effects would be if those outside parties got it. It is important that confidentiality is always regulated at the highest level otherwise doomsday results good happen from it.

Integrity

“Making sure the data is accurate, consistent, and reliable is what integrity is.” (Chai 1) Unauthorized people should never be allowed to change data.

Availability

Availability is exactly what it sounds like. Authorized users should always have access to the information always given to them. The systems that hold the information should always be monitored and function properly, so the information is available efficiently.

Authorization and Authentication

Authentication relates to confidentiality. For example, every time I need to sign in to an account I use personally, it requires two factor authentication. It is very reliable for keeping and securing data so that only authorized users have access to the data. Authorization relates more to integrity and availability, meaning the data secured is only accessible to those who are authorized to said data.

Conclusion

The CIA Triad is important because it sets the foundation for organizations that are involved with cybersecurity. It is a guide to those organizations to question if what they’re doing is correct according to the CIA guidelines, and what room is there to improve in, and where orgs can adapt to situations and crises when they occur.


​​Works Cited​





Chai, Wesley. (2022). What is the CIA triad_ definition, explanation, examples – techtarget.pdf. Google Drive. https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view

Leave a Reply

Your email address will not be published. Required fields are marked *