The Backbones of Computer Security: Confidentiality, Integrity, and Availability & Authentication and Authorization

Confidentiality

Confidentiality’s role in the CIA triad involves protecting sensitive data from unauthorized lookers, only allowing it to be accessed by specific parties or a specific individual. To ensure confidentiality one could use strong encryption methods like AES or RSA to protect data from unauthorized reading, even if intercepted (GeeksforGeeks, 2018). In a world of technology and portable devices, confidentiality can be seen throughout one’s everyday life; an example could be one’s iPhone locking down after multiple failed password attempts to prevent intruders. Without confidentially, businesses would be subjected to more breaches, and many would be victim to phishing scams.

Integrity

Integrity is responsible for providing accurate and consistent data while also preventing alterations by unauthorized individuals. For example, imagine a scenario where one is recording their bills or taxes. In order to do so effectively, the information not only has to accurate but also needs to be protected from any unauthorized changes. Which is why to maintain integrity, cybersecurity experts implement hashing, checksums, and tamper-evident controls, helping organizations detect unauthorized changes and respond to potential threats quickly (Fasulo, 2021). It is unlikely that one would be eager to offer someone details of their private life if they do not trust them, which is why trust, or integrity, is a core aspect of the triad and its practices.

Availability

Availability is the final model of CIA, one that functions to guarantee that information and data is always able to be accessed when authorized personnel need it. This is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a properly functioning operating system (OS) environment that is free of software conflicts (Chai, 2022). Availability often utilizes data backups, network security, and disaster recovery plans to achieve continuity and prevent disaster. Be it health records, tax returns, passwords, or various papers, it is common for one to have vital information that would be tragic to lose, and in the digital age, chances are most of this data is stored on a computer. Think of a password being changed without one’s knowledge–everything on that device would be unable to be accessed. With no availability, countless important documents would be made futile, emphasizing the model’s importance.

Authentication vs Authorization

Authentication verifies the identity of the individual using a service and if they are permitted to access it, while authorization determines the degree of access the individual has. The two concepts may seem similar, but they are not the same despite going hand-in-hand with one another. Authentication confirms who someone is and always goes first as authorization follows to control what the user can access and do. For example, permissions in a file system might dictate whether a user can create, read, update or delete files (Kosinski, 2024).

Conclusion

In summary, The CIA triad is a foundational model used to direct security policies within establishments. The triad guarantees all data is preserved from prohibited parties, consistent, and accessible to authorized personnel. Considering these three principles together within the triad framework guides the development of security policies for organizations (Hashemi-Pour, 2023). Additionally, authentication and authorization work in harmony to make sure no unauthorized groups acquire or edit restricted resources. In brief, the CIA triad and both authentication and authorization are key parts of computer security.

Leave a Reply

Your email address will not be published. Required fields are marked *