The CIA Triad

The CIA Triad in summary is a very important set of guidelines that makes finding any vulnerabilities much easier. It developed overtime and is used in many organizations. The Triad itself ensures that organizations have a way to protect their data and other information from leaking out, but it is very important first to understand the principles first. There are three principles that must be known to understand the CIA Triad. Confidentiality, Integrity, and Availability.

Confidentiality

Confidentiality is extremely important, especially for data that is not supposed to go in the wrong hands or with rouge employees. This is where Authentication and Authorization comes in. Employees need to enter their own password or company ID to get access to a work computer or email but must use their phone to approve the login. This is an example of Authentication, rather, Two Factor Authentication. Authentication requires that the person or employee must verify they are them when logging in which helps with confidentiality and protecting data. Authorization is where the computer comes into play and determines what files, what software, etc. that the employee can get access to after the employee authenticates. These two very important steps keep very important information only to those who should have access to it.

Integrity

Integrity is vital for data and its transfer process. With authentication and authorization, this greatly prevents any hands from getting on the data, but it still must be monitored. From what Wesley has written, “Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people.” (Chai 2022) This means that data must always be kept protected and actions must be taken quickly in the case of a data breach in which any data is leaked by quickly notifying all parties who have had their data breached as quick as possible.

Availability

 Lastly, Availability is also very important as part of the guide for organizations. This allows data to be available only to certain parties and not to the public which includes properly keeping technology and other systems updated and properly tested that keep this data and information stored. (Chai 2022) This step makes sure that authentication and authorization are fully working as intended, but also making sure that all data is transferred correctly without being modified or taken from outside forces.

Conclusion

 In conclusion, the CIA Triad is very important for companies and organizations who need cybersecurity assistance. Without this guide, data breach would become very common, much bigger, and cause a lot of damage and money to the company in question.