CIA Triad



The CIA Triad has impacted our cyber security history. According to the article, it formed over time without a single creator. First, in 1976, Confidentiality was proposed as a study by the U.S. Air Force. Next, in 1987, Dave Clark and David Wilson wrote a document about Comparisons of Commercial and Military Computer Security Policies. For instance, in the document, information on commercial computing is needed for accounting records and data correctness. At that point, the concept of availability increased worldwide a year later in 1988. Ultimately, all three concepts came together and created the CIA Triad.



What is the CIA Triad?
CIA Triad is a model designed to guide the policies for the information protected within the organization. On the other hand, the AIC Triad is also a model that refers to the CIA Triad and avoids confusion with the Central Intelligence Agency. The three elements of the Triad are Confidentiality, Integrity, and Availability. They are the considerable quality foundational and crucial cybersecurity needs. Based on the information, experts believe that the CIA Triad needs improvements in their authorization of individuals by setting rules and that the information is trustworthy or accurate.
Difference Between Authentication and Authorization
Authentication is identifying who the person is. An example of this would be changing your password for your Google account. When I was doing school online, my password for my MIDAS account was about to expire. So, my parents and I had to come up with a password. Attempts at creating a new password didn’t go too well because the passwords were not allowed in the dictionary. So, we decided that my new password should be my nickname. However, I need to save it as my password for my school account.


As for Authorization, it is verifying applications, flies, and data to access your account. An example would be the identification. My grandmother and I are going to Belgium for my 12th-grade graduation, but I had to create my passport for identification. Another example is my search history on my Macbook.


Furthermore, authentication and authorization’s only goal is to keep users safe online.



Conclusion
In conclusion, the CIA Triad is significant because each letter represents a foundational principle of cybersecurity. For instance, it is vital to protect their data, which could help guide the development of security policies for the organization.

References

“What Is the Difference between Authentication and Authorization?” SailPoint, 7 Mar. 2023, www.sailpoint.com/identity-library/difference-between-authentication-and-authorization/#:~:text=So%2C%20what%20is%20the%20difference,a%20user%20has%20access%20to.   Unitrends. “The CIA Triad and Its Importance in Data Security.” Unitrends, 6 May 2021, www.unitrends.com/blog/cia-triad-confidentiality-integrity-availability#:~:text=The%20CIA%20triad%20is%20vital,regulations%20and%20ensures%20business%20continuity

Leave a Reply

Your email address will not be published. Required fields are marked *