Breakdown of the CIA Triad
The CIA Triad is a system made of 3 values that help keep important information in the
group that uses this system. These values are composed of confidentiality, Integrity, and
availability. Starting with confidentiality according to (Chai page 3) is privacy on your
information or very important information and the measures set up to keep those things private.
Integrity according to (Chai page 4) is upholding the quality, and trustworthiness of the data for
the data lifecycle so no other outside source can tamper or mess with said data. Last is
availability, availability around to (Chai page 4-5 ) is the fact that information should always be
ready to access and whenever needed for any party that has the authority to access the data or
information.
differences between Authentication & Authorization
The difference between Authentication and authorization is that Authentication is the
process of proving you are who you say you are, whereas authorization is checking to see if you
have clearance or the authority to access something. An example of Authentication would be
signing into an account and it asks you questions you answered before. An example of
Authorization would be a government-issued key card you would use to sign in to government
work computers.
Conclusion of CIA Triad
The CIA triad is a system that’s made up of three core parts: Confidentiality, Integrity, and Availability. The triad works by training employees and students about the importance of confidentiality, Integrity, and Availability. The importance of Confidentiality is to keep the privacy of valuable information and the measures needed to do so. The importance of Integrity is to uphold the quality and trustworthiness of data so no other outside sources can tamper with the data. The importance of Availability is keeping information ready for access at any time for anyone who has authorization to the data. The CIA triad is used in many companies and places, it helps bolster security and help train employees using the program.
Work cited.
Work cited
Chai, W. (2024, January 23). What is the CIA triad? definition, explanation, examples –
techtarget. Whatls.com. Retrieved September 15, 2022,
fromhttps://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA?jr=
on
“Difference between Authentication and Authorization.” GeeksforGeeks, GeeksforGeeks,
22 Feb. 2023, www.geeksforgeeks.org/difference-between-authentication-and-authorization/.