The Important CIA TRIAD

This article is about the CIA Triad. This article also has the difference between authentication
and authorization.

The CIA Triad is a model to guide policies for information security within an organization. It can be
also called the AIC to not be confused with the dental intelligence agency. The CIA is also known
as confidentiality, integrity and availability. Confidentiality means privacy from unauthorized
people. Integry is to maintain consistency of data and it must not be changed. Availability means
that it is ready to be used by other parties.
Authentication and Authorization
“Both Authentication and Authorization area units are utilized in recency of knowledge security
that permits the safety of an automatic data system (MKS075 et al., 2019). The authentication
process has the user’s identity checked for providing access to the system. The authorization
process uses the person’s authorities when accessing resources. The authentication process is
used before the authorization process.
Conclusion
In conclusion, the CIA triad is important and the three principles help guide security policies for
organizations. Authentication comes before authorization and is the first step of security.
Authorization comes after and is based on the user’s authority, having access to specific data.
References
Difference between Authentication and Authorization – GeeksforGeeks.
(2019, June 6). GeeksforGeeks.
https://www.geeksforgeeks.org/difference-between-authentication-and-a
uthorization/
What is the CIA Triad? Definition, Explanation, Examples – TechTarget.
(2022, June 8). Wesley Chai.
What is the CIA Triad_ Definition, Explanation, Examples – TechTarget.pdf
– Google DriveReferences
Difference between Authentication and Authorization – GeeksforGeeks.
(2019, June 6). GeeksforGeeks.
https://www.geeksforgeeks.org/difference-between-authentication-and-a
uthorization/
What is the CIA Triad? Definition, Explanation, Examples – TechTarget.
(2022, June 8). Wesley Chai.
What is the CIA Triad_ Definition, Explanation, Examples – TechTarget.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *