BLUF
The CIA triad (which stands for confidentiality, integrity, and availability) is a system that is crucial to organizations to stay secure within their network online. Authentication is regularly referred to as the process of proving who you say you are (Werner). While Authorization is an act of proving who you say you are. (Werner)
Introduction
The most accurate discretion of the CIA triad is that it is an information security model which can guide an organization in helping to keep its data secure. (Fruhlinger) Confidentiality is when only authorized users can access or change the data. Integrity is when data is maintained so that no one who doesn’t have access should be able to change it. Availability states that authorized users should have access to the data whenever they need to. There are many key differences between authorization and authentication. The biggest difference is that authentication confirms users are who they say they are while authorization gives the users permission to access certain data.
Overall Importance of the CIA
The fundamentals of the CIA triad are groundwork that paints the picture of modern cyber security within organizations. The CIA can be seen as a focus question to improve a network’s security in specific areas rather than being unsure where the money is going when securing an institution’s network. The overall use of the CIA is to help guide the security teams to address certain areas within the organization.
Confidentiality
Confidentiality refers to the measures an organization goes through to ensure that the data is private and only those who are supposed to have access. A common way in which organizations ensure this is through two-factor authentication which is used in the ODU network and makes the user both put in the username and password as well as type in a number or use another device to ensure security. Another use of confidentiality is Biometric verification which typically involves a fingerprint, iris scan, or voice verification which can only be accessed by one person. I would argue that this is one of the most secure ways of verification.
Although we have many ways of verification within the 21st century there are still ways in which people who shouldn’t have access to certain information receive it. For example, individuals regally choose easy passwords which computer software could easily guess after some time. Or for instance, a person writing down their password on a piece of paper and losing it. There is a multitude of ways in which confidentiality can be compromised.
Integrity
“Integrity involves making sure your data is trustworthy and free from tampering.” (Fortinet) Keeping up to date with the latest and most modern technology can help keep the integrity of a network. Ensuring only certain trusted members of an organization have access to certain permissions within the network. Using safeguards to detect a change in the data can assist the organization to be less prone to cyber-attacks such as EMPS or server crashes. (Chai)
Integrity also refers to a company’s security and overall policies which need to be up to date as well as adequate for the network in question. This is done within ODU as professors will not access emails from people outside the organization to keep themselves secure and not prone to cyber-attacks.
Availability
Availability refers to how readily available and safe an institution’s data is to the public. Maintaining and repairing a network’s hardware is very important to keep the network readily available. Individuals should only be able to access certain information and be able to access that information promptly making it easy to access. A common cyber attack that cripples the availability of a network is a DDOS which can cripple a network for long periods if a network does not have certain safeguards to prevent this. A majority of availability is keeping up to date with new software and overall online security.
Authentication vs Authorization
Authentication is achieved by verification of the identity of a person or device. (Werner) While authorization differentiates what certain data you should and shouldn’t have access to. Both are very much crucial to run a safe and secure network. Both of these methods are regularly used within the cybersecurity field and more specifically within networks such as Microsoft.
Conclusion
To close I would like to say without all 3 of the CIA triad it would be incomplete leading to more cyberattacks and vulnerabilities within networks. By using all confidentiality, availability, and integrity a company can take measures to make a network more secure. The primary distinction between the two is that whereas authorization grants users access to particular data, authentication verifies that users are who they claim to be. Using these cybersecurity basics can help guide professionals to build a safer and more secure network.