Jerome Crawford
2/16/2025
BLUF
The CIA Triad ensures data security through Confidentiality, Integrity, and Availability.
Authentication verifies identity, Authorization grants access rights.
1. The CIA Triad
Confidentiality: Protects various data from unauthorized access.
Example-Hospitals use encrypted databases to store patient records, allowing ONLY
doctors with credentials to access them.
Integrity-: Ensures data accuracy and trustworthiness.
Example-:Bitcoin uses blockchain technology cryptographic hashes to verify that
transactions aren’t missed with after they’re recorded.
Availability- Guarantees data is accessible when needed.
Example : Redundant servers or backups.
Authentication vs. Authorization
Authentication- It verifies exactly who you are from passwords , Face ID’S on your phone today .
Example: Logging into email with a password + 2FA.
Authorization-Determines what you can access
Example: HR staff accessing employee records but not financial data.
Conclusion
The CIA Triad safeguards data, while Authentication and Authorization work together to control
system access.
References
– Chai, A. (2022). What is the CIA Triad? Definition, Explanation, Examples