The CIA triad write up.

Breakdown of the CIA Triad

The CIA Triad is a system made of 3 values that help keep important information in the

group that uses this system. These values are composed of confidentiality, Integrity, and

availability. Starting with confidentiality according to (Chai page 3) is privacy on your

information or very important information and the measures set up to keep those things private.

Integrity according to (Chai page 4) is upholding the quality, and trustworthiness of the data for

the data lifecycle so no other outside source can tamper or mess with said data. Last is

availability, availability around to (Chai page 4-5 ) is the fact that information should always be

ready to access and whenever needed for any party that has the authority to access the data or

information.

differences between Authentication & Authorization

The difference between Authentication and authorization is that Authentication is the

process of proving you are who you say you are, whereas authorization is checking to see if you

have clearance or the authority to access something. An example of Authentication would be

signing into an account and it asks you questions you answered before. An example of

Authorization would be a government-issued key card you would use to sign in to government

work computers.

Conclusion of CIA Triad  

The CIA triad is a system that’s made up of three core parts: Confidentiality, Integrity, and Availability. The triad works by training employees and students about the importance of confidentiality, Integrity, and Availability. The importance of Confidentiality is to keep the privacy of valuable information and the measures needed to do so. The importance of Integrity is to uphold the quality and trustworthiness of data so no other outside sources can tamper with the data. The importance of Availability is keeping information ready for access at any time for anyone who has authorization to the data. The CIA triad is used in many companies and places, it helps bolster security and help train employees using the program.

Work cited.

Work cited
Chai, W. (2024, January 23). What is the CIA triad? definition, explanation, examples –
techtarget. Whatls.com. Retrieved September 15, 2022,
fromhttps://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA?jr=
on
“Difference between Authentication and Authorization.” GeeksforGeeks, GeeksforGeeks,
22 Feb. 2023, www.geeksforgeeks.org/difference-between-authentication-and-authorization/.

Leave a Reply

Your email address will not be published. Required fields are marked *