Nathan Edwards
CYSE 200T
Professor Aldabagh
CIA Triad; Feb 5th
The CIA Triad is defined as a model that guides policies for information security within an organization (Chai, 2022). The CIA Triad consist of three main parts which are confidentiality, integrity, and availability. Confidentiality in the CIA Triad is defined as privacy. Confidentiality help prevent sensitive information from unauthorized access attempts (Chai, 2022). How confidentiality is used today is involving special training to help train stronger passwords and preventing users from changing data (Chai, 2022). This involves two-factor authentication or other options like biometric verification, security tokens, or key fobs (Chai, 2022). This allows for safety among cybersecurity threats by creating precautions and establishing privacy. The second part of the CIA Triad is known as integrity. Integrity is defined as consistency, accuracy, and trustworthiness of data across its entirety (Chai, 2022). This is an important part of the CIA Triad because it allows for steps to be taken so that data is never altered by unauthorized individuals (Chai, 2022). The CIA Triad allows for integrity by having different permissions and user access controls (Chai, 2022). These controls then allow for the prevention of changes/deletions of data or any other changes that may have occurred from non-human-
related crashes (Chai, 2022). The last part of the CIA Triad is known as availability. Availability is defined as making sure information is accessible for authorized bodies (Chai, 2022). It is important to make sure all software and system upgrades are up to date. The difference between authentication and authorization is that authentication just verifies the identity of the
user, while authorization verifies the rights that the user has (OneLogin).
References:
Authentication vs. authorization: What’s the difference? OneLogin. (n.d.). from https://www.onelogin.com/learn/authentication-vsauthorization#:~:text=Authentication%20verifies%20the%20identity%20of,the%20securit y%20of%20a%20system.
Chai, W. (2022, June 28). What is the CIA triad? definition, explanation, examples – techtarget. WhatIs.com. from https://www.techtarget.com/whatis/definition/Confidentiality-integrityand-availability-CIA