CIA Against Threats
Understanding the principles of the CIA triad helps to acknowledge this concept cannot exclusively be applied to companies but also society as a whole. The CIA triad ensures that data security is safe while managing to control vulnerabilities. And by its side comes authentication and authorization that also helps to verify and determines access right.
CIA Triad
The three components that mainly substructure the CIA are confidentiality, integrity and availability. These serve and help to designate and accomplish their goal of protecting information. Confidentiality mainly deals with the access to sensitive information. For example, sensitive information that cannot be disclosed to the public because it can cause many issues to a company or to a person. Integrity mainly deals with keeping constancy of information to mainly not be altered overtime. An example of this is abstaining from relieving sensitive information to others. Lastly, availability mainly deals with accessibility to information to authorized people only, meaning the information should be reliable at all times when asked for it.
Authentication
According to Tech Web authentication “should be used whenever you want to know exactly who is using or viewing your site,” In other words, authentication was made with the only purpose of verifying who the system or person is attempting to use it. An example of this is when a student or a faculty member is required to verify or authenticate through the app Duo Mobile in order to log into their respective accounts.
Authorization
TechWeb describes authorization as “ a process by which a server determines if the client has permission to use a resource or access a file.” In simple words, when a system determines if an individual has direct permission to access a file or a resource. For instance, when a student shares a private link with their professor, and once they try to open it, it doesn’t work because they don’t have permission to view, therefore it’s necessary to send a request in order to have access to the file or document.
Conclusion
Protecting systems, and information is the main reason why the CIA was created. With its three main elements, confidentiality, integrity, and availability it is always important to remember that those foundations all together make it possible for its ultimate job, which is the application of its security control. And with that being said, authorization and authentication play a similar role, but these ones are in charge of specifically ensuring that only authorized individuals have access to information when they need it.
References:
(n.d.). Understanding Authentication, Authorization, and Encryption. TechWeb. https://www.bu.edu/tech/about/security-resources/bestpractice/auth/
(n.d.). Confidentiality, Integrity, and Availability: The CIA Triad. Washington University in St. Louis. https://informationsecurity.wustl.edu/items/confidentiality-integrity-and-availability-the-cia-triad/
(n.d.). What is the CIA Triad? Definition, Explanation, Examples. TechTarget. https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view
