The CIA Triad

The CIA triad, which is also known as confidentiality, integrity, and availability, isconsidered one of the most integral concepts in cyber security. It helps guide policies forinformation security in organizations. Its essentially a way to keep important informationsafe. Authentication and authorization are very important to the CIA Triad. Authenticationallows systems to verify a user is who they say they are. Examples of authentication includebiometrics and security tokens. Authorization is simply put. You must have the right toaccess the data. According to the article by Josh Fruhlinger, Publickey cryptography is awidespread infrastructure that enforces both authentication and authorization.(Fruhlinger, 2024)
Confidentiality is all about privacy. Makes sure that access to data is only for whoits intended for. The more sensitive the information is, the more severe the security shouldbe. Some examples include encryption and twofactor authentication. Integrity is all aboutmaintaining the efficiency and completeness of data. The data is protected from beingaltered. Some examples also include encryption and user access controls. Availabilityrefers to information needing to be available when needed. Hardware and software need tobe properly maintained and always functioning.
References:Fruhlinger, J. (2024, July 12). What is the CIA triad? A principled framework for defininginfosec policies. CSO Online. https://www.csoonline.com/article/568917/theciatriaddefinitioncomponentsandexamples.html
freeCodeCamp. (2020, February 1). The CIA triad confidentiality, integrity, and availabilityexplained. freeCodeCamp.org. https://www.freecodecamp.org/news/theciatriadconfidentialityintegrityandavailabilityexplained/
HashemiPour, C., & Chai, W. (2023, December 21). What is the CIA triad?: Definition fromTechTarget. WhatIs. https://www.techtarget.com/whatis/definition/ConfidentialityintegrityandavailabilityCIA

Leave a Reply

Your email address will not be published. Required fields are marked *