{"id":282,"date":"2025-09-24T20:33:39","date_gmt":"2025-09-24T20:33:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/?p=282"},"modified":"2025-09-24T20:33:39","modified_gmt":"2025-09-24T20:33:39","slug":"understanding-the-cia-triad-authentication-vs-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/2025\/09\/24\/understanding-the-cia-triad-authentication-vs-authorization\/","title":{"rendered":"Understanding the CIA Triad &amp; Authentication vs. Authorization"},"content":{"rendered":"\n<p>THE CIA TRIAD<br>The CIA Triad is an information security model that outlines the three fundamental<br>concepts that businesses should use to protect their data systems: availability,<br>confidentiality, and integrity.<br>AUTHENTICATION VS AUTHORIZATION<br>These two ideas have separate functions in system security. Both are necessary and<br>frequently used together.<br>AUTHENTICATION: Confirming the identity of someone proving identity. Occurs first. To<br>verify their identity, the user provides credentials. Ex: using a smartphone fingerprint scan<br>or logging into an email account with a username and password.<br>AUTHORIZATION: Determining the resources and operations that an authenticated<br>identity is permitted to access and complete. Occurs after authentication. The system<br>determines access by examining policies or permissions after identity has been verified.<br>Ex: You might not be able to edit specific files or access specific data (authorization) even if<br>you are able to log in (authentication). A regular employee, for instance, authenticates but<br>is only permitted to access specific documents. Not change or remove them.<br>KEY DIFFERENCES:<br>Authorization is about access rights, but authentication is about identification.<br>Authorization requires authentication; you can&#8217;t decide what someone can do unless you<br>know who they are.<br>EXAMPLES OF INTEGRATING CIA TRIAD +<br>AUTHENTICATION VS AUTHORIZATION<br>Imagine a hospital&#8217;s electronic health record system.<br>CONFIDENTIALITY: Medical records of patients must be kept confidential. These records<br>should only be viewed by the medical professionals who are currently treating a particular<br>patient.<br>INTEGRITY: Timestamps must be kept, records must be correct, and audit logs must be<br>kept so that changes can be tracked.<br>AVAILABILITY: To ensure that patient care is not interrupted during system maintenance or<br>disaster recovery, doctors and nurses must have round-the-clock access to patient<br>records.<br>AUTHENTICATION: To establish her identity, a nurse checks in with her username,<br>password, and possibly a smart card.<br>AUTHORIZATION: The system verifies her authorization to read or modify specific patient<br>records after she has been authenticated. She might, for instance, be permitted to access<br>patient records in the ward to which she has been assigned, but no change or view<br>psychiatric or intensive care records that are under the supervision of another team.<br>WRAP UP<br>The CIA Triad offers a straightforward yet effective structure to guarantee that information<br>security is addressed in the three crucial areas of availability, confidentiality, and integrity.<br>In addition, the control techniques of authorization and authentication serve to restrict<br>who has access to system (authorization) and what they are allowed to do within them<br>(authentication). These ideas work together to provide the foundation of many technical<br>controls and cybersecurity policies. Gaining experience with them is crucial for effective<br>data protection and system trust.<\/p>\n\n\n\n<p>REFERENCES<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-<br>CIA?utm_source=chatgpt.com<br>https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-<br>examples.html?utm_source=chatgpt.com<br>https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-<br>authorization?utm_source=chatgpt.com<br>https:\/\/auth0.com\/docs\/get-started\/identity-fundamentals\/authentication-and-<br>authorization?utm_source=chatgpt.com<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-examples.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-examples.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>THE CIA TRIADThe CIA Triad is an information security model that outlines the three fundamentalconcepts that businesses should use to protect their data systems: availability,confidentiality, and integrity.AUTHENTICATION VS AUTHORIZATIONThese two ideas have separate functions in system security. Both are necessary andfrequently used together.AUTHENTICATION: Confirming the identity of someone proving identity. Occurs first. Toverify their identity,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/2025\/09\/24\/understanding-the-cia-triad-authentication-vs-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":31565,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/users\/31565"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justincotmanstudio\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}