The CIA Triad- What is it?


CONFIDENTIALITY
Confidentiality mainly protects and secures sensitive information from other unauthorized personnel. For example, if you get a new app on your phone, only for 2FA. You use this app to log into your student account at school. In this example confidentiality is used in the 2FA because no one else can access the app linked to your school account, but you. This type of privacy could be used in a business also whether you have to log in for your work and there will be some sort of privacy section shown, and you have to grant access through another authentication like 2FA. Cybersecurity teams would use these types of methods so that no one with unauthorized access can get in.

INTEGRITY
Integrity is keeping the data consistent and making sure no data or algorithms have changed. When data is being processed we have to make sure the data is not being manipulated or corrupted. Data being manipulated or corrupted is bad for the system overall. It can crash servers, slow down performances, blue screens, etc. Cybersecurity teams prevent this by using antivirus software to block out these types of corruption. They may also make you check and troubleshoot your system issues periodically. They will also use data encryption to make sure that the data matches with the algorithm so it can be safely transported. With integrity, you have to make sure to look at these systems and data every day make sure the data is running smoothly, and look for anything suspicious that doesn’t match the algorithm.

AVALIBILITY
Availability is making sure that all systems are available so that users can use them when they need them. “Fast and adaptive disaster recovery is essential for the worst-case
Scenarios…Safeguards against data loss or interruptions in connections must include unpredictable events such as natural disasters and fire. To prevent data loss from such occurrences, a backup copy may be stored in a geographically isolated location, perhaps even in a fireproof, waterproof safe.” (Chai, Pg. 4). This is a good example of availability because if we lose those documents or even a system in that fire or natural disaster we have to make sure we have back-ups that’ll be available. Cybersecurity teams will think about these types of scenarios so the business documents, software, and even hardware will be safe and available.

AUTORIZATION VS AUTHENTICATION
Authorization and Authentication are both important when it comes to security for an account, website, etc. The differences is authentication is when you use a username and password to log into your account and this could be 2FA also. Authorization will ask you what permissions do you have. Depending on the system it will automatically know what type of permissions you have based on your log in or role in the business. Types of permissions on the businesses website or whatever they use to store their documents will give you permission if you can access these documents or not.
CONCLUSION
In conclusion we went over the 3 safety measures and what’s the differences between Authorization and Authentication. We learned that the CIA Triad stands for Confidentiality which means privacy and security, Integrity which means consistency, and Availability which means how available that system is going to be for that user. All 3 measures are important and crucial when making sure data and documents are safe and secured for a organization or company.















Works Cited
Chai, W. (2020, February 10). The CIA triad: Definition, components and examples. CSO
Online.https://www.csoonline.com/article/568917/the-cia-triad-definition-components-and-examples.html

Leave a Reply

Your email address will not be published. Required fields are marked *