CIA triad stands for confidentiality, integrity, and availability. These three ideas are what make up any reliable security force. Ranging from network protection to how you unlock your cell phone. Confidentiality means that only an authorized individual can access said data. Integrity is the next step, where said data is able to remain the way it is supposed to. Lastly, availability is simply the authorized individual being able to access said data whenever need be. With the ever-growing field of technology comes more advanced ways to protect data. Which is becoming more necessary as those who seek to hack your data have more advanced resources as well. Thus there is no real origin for the CIA Triad. The concept of security has always been in play and over the years it has simply become more of a necessity. As stated in The CIA triad: Definition, Components and examples, “the triad is a way of thinking, planning, and, perhaps most importantly, setting priorities”. This idea of the triad being a way of thinking is superior to thinking all you need is better hardware or software. Securing your data is not an easy task, especially for the bigger businesses that have thousands of individuals working for them. All of their data has to be protected and readily accessible whenever they, or an authorized individual, need to access it. Authentication is as stated by NIST.gov, “ verifying the identity of a user, or device, often as a prerequisite to allowing access to resources in an information system”. Whereas authorization is “Official permission for something to happen, or the act of giving some official permission to do something”, as stated by Cambridge.org. Authentication is more directed to verify who the user who is trying to access any given data is. Where authorization is limiting what data they have access to. An example of this would be any website an individual must log into with their credentials. The credentials are to authenticate who they are and their access is based on their authorization. So two different people may log onto a said website and see two different screens based on their authentication.