The CIA triad is used as a security model to help organizations and companies, policies and efforts to keep data protected. This is important for everyone in cybersecurity to know what this is because it can help reduce risk and threats that can be done to someone’s account, or to someone’s personal information. The CIA is the initials for the three fundamentals approach in cybersecurity. The three concepts are Confidentiality, Integrity, and Availability. When it comes to confidentiality it is broken up into two sections, Authentication and Authorization.
Authentication is when a person goes to log into their account and the computer asks them who they are. Then once the person verifies that they are who they say they are, they are given permission to view the information that they are asking to view. Many different companies and organizations use this to keep their customers’ information private. They use this by asking for a password or pin and now what is gaining more popularity in recent years is touch identification or facial recognition. The last one is authorization which is the step after authentication. While authentication will let you into an account, authorization determines what information you are allowed to see and access. This extra step is taken so you can access your personal information and anyone else using the same website cannot see yours. For example, when you login into your banking account you just want to see your information and that no one else should see it. That is why the authentication is put in for that extra security measure. When putting authentication and authorization it can ensure the user the best protection for any
information they might have stored on the website or app they are using. Understanding the CIA triad and the difference between authentication and authorization will help you be able to protect and keep peoples confidential information secure.
References
Difference between Authentication and Authorization. (2020, July 07). Retrieved September 24, 2020, from https://www.geeksforgeeks.org/difference-between-authentication-and-authorization/
Fruhlinger, J. (2020). The CIA triad.pdf. Retrieved September 24, 2020, from
https://drive.google.com/file/d/1Mn3icTLG5X3W7tJjuDaohW8OscHdLOQI/view
Piscitello, D. (2015, Dec. 02). What is Authorization and Access Control?. Retrieved September 25, 2020, from https://www.icann.org/news/blog/what-is-authorization-and-access-control
Steward, J. (2018, June 26). The Three Types of Multi-Factor Authentication (MFA). Retrieved September 25, 2020, from https://www.globalknowledge.com/us-en/resources/resource-library/articles/the-three-types-of-multi-factor-authentication-mfa/