Name: Lindsey Lorton
Date: January 25, 2024
Exploring the CIA Triad
The CIA triad describes the three core ideas of cybersecurity: Confidentiality, Integrity, and Availability.
Breaking Down the Triad
While the CIA Triad’s concepts typically function interconnectedly, it is important to understand how each works independently. Confidentiality deals with protecting and securing sensitive information, including the use of passwords, encryption, and backing up of that information. Special training is used to teach safeguarding techniques to those who do have access to private and sensitive information (Chai, 2022). Integrity provides protection for sensitive information. Hashing algorithms can be used to ensure the integrity of information and can reveal if data has been changed (Brooks, 2019). Availability ensures that authorized individuals can always access sensitive information. This also includes the maintenance of hardware and software, with regular maintenance and performance checks (Fasulo, 2021).
What is the Difference Between Authentication and Authorization?
Authorization means specific persons can access private information. Authorized persons receive training in how to appropriately access information. Training also includes methods of identifying bad actors who may encourage mishandling such privileged data (Chai, 2022). Authentication is used to prove the appropriate people can access sensitive information. Two-factor authentication is an example, with a special code or push button being required along with log-in credentials (Fasulo, 2021).
Two-factor authentication is used by Old Dominion University. Students are required to prove their identity when logging in to student accounts. One way to satisfy the authentication requirement is to download an application that will prompt the student to push a button when notified on their cell phone. If a student is unable to use the application, ODU will send a set of numbers via text message or email that the student then uses to access their student accounts, coursework, and financial documents. ODU also recommends students to change their log-in passwords regularly, along with the use of two-factor authentication (Two-Factor Authentication, 2024).
In Conclusion
The CIA Triad speaks to the core ideas of cybersecurity. Each concept can work independently of one another, or function interconnectedly. The importance of confidentiality, integrity, and availability ensures sensitive information is protected and easily accessible. When considering the difference between authentication and authorization, it is important to remember that authentication deals with providing credentials to prove one is authorized to access secure information. Old Dominion University requires that students use two-factor authentication to access their financial information, student accounts, and coursework.
Works Cited
Brooks, R. (2019, March 26). What is the CIA Triad? Retrieved from Netwriz: https://blog.netwrix.com/2019/03/26/the-cia-triad-and-its-real-world-application/
Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples. Retrieved from TechTarget: https://drive.google.com/file/d/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l/view
Fasulo, P. (2021, September 1). SecurityScorecard. Retrieved from What is the CIA Triad? Definition, Importance, & Examples: https://securityscorecard.com/blog/what-is-the-cia-triad/
Old Dominion University. (2024, January 26). Two-Factor Authentication. Retrieved from ODU.edu: https://ww1.odu.edu/ts/access/two-factor-authentication