In this write-up, I first describe the CIA triad and how all three functioning parts work
together best to help a security system run smoothly while being properly protected by ensuring
who needs to have access does, the systems have safe and reliable forms of backup protection in
case errors or attacks on the system happen, and how the systems keep the right information for
the right person available at any time. I then differentiate authentication as confirming one’s
identity vs. authorization as someone being able to access the information they are permitted to
view.
The CIA Triad
When a company, or being, needs to better learn how to protect its security systems and the
valuable information that it protects, they need to look at the balance needed to create a clean and
consistent foundation for their security. The triad is broken down into three main parts that all
coincide with each other, which are confidentiality, integrity, and availability. All, if balanced
properly, work hand in hand with each other to ensure better safety for organizations. This
module can be broken down into the simple idea that most organizations have certaininformation contained in their files that should only be accessed by those who need it and should
have access to it, which is described through the confidentiality part of the triad. It is then broken
down by the integrity side into the systems that protect all of that same information and how, if
left accessible to the wrong person or a fault in the security system, the organization would be
distraught. Finally, the availability side is seen as how accessible the information or data is to the
people who need to view it. The systems that keep this running smooth are in place to ensure it is
timely and effective at getting information kept organized and readily available to those needing
to access it.
Authentication vs. Authorization
Authentication is the act of a system confirming who is accessing the content or
information requested, while authorization can be defined as the confirmation that the right
person is able to access their specific permitted data or information.
Authorization examples could include the face ID on most devices nowadays, the
usernames that are created specific to you, and even the use of a valid ID in required places. On
the other hand, authorization would have examples as simple as who you give access to view or
edit a document, managers deciding who gets access to the companies’ asset information, or who
can change settings on your home alarm system.