The CIA Triad is a concept used in cybersecurity that focuses on keeping data safe, accurate, and accessible. It is all about making sure the right people can access the right information while protecting them from unauthorized access and corruption (Chai, 2022).
The CIA Triad Concepts
Confidentiality is about maintaining the privacy of sensitive information and making sure only those who are authorized can see it. This is like using passwords, encryption, or two-factor authentication to lock down data, so it does not get into the wrong hands (Chai, 2022). Integrity is about making sure data stays accurate and unchanged unless it is meant to be changed by the appropriate people. Things like file permissions and version control help prevent data from being accidentally or intentionally messed with (Chai, 2022). Availability ensures that the data or systems are always ready and accessible to authorized users. This involves keeping systems updated, fixing hardware issues quickly, and having backup plans in case things go wrong, like during a disaster, or cyberattack (Chai, 2022).
Authentication vs. Authorization Authentication
This idea is about proving that you are who you say you are. Just like when you log in to a website using your username and password, or even fingerprint or face ID. It is the first step to getting in (Chai, 2022). Authorization comes after authentication. It decides what you can do once you have logged in. For example, you might log in to a work system (where you will need to be authenticated or verified), but you can only access certain files based on your role (due to the level of authorization (Chai, 2022). For example, say you log in to your online banking account using your credentials. That is authentication. But being able to transfer money or just view your balance depends on your authorization level.
In conclusion the CIA Triad, along with the difference between authentication versus authorization, plays a key role in cybersecurity. Confidentiality, integrity, and availability are major building blocks toward keeping data secure. Making sure that the users are properly authenticated and authorized adds to the precision level to make sure only the right people can do certain things.
References:
Chai, W. (2022). *What is the CIA Triad? Definition, Explanation, Examples. * TechTarget. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA