The CIA triad is an information security model that helps guide organizations when it comes to keeping their data secured. The CIA is made up of three key components, which are confidentiality, integrity, and availability with each having their own part of importance. Confidentiality goes for only allowing authorized users to be able to access data. Integrity means data should be in the correct state and no one can modify it improperly and availability just goes for the authorized user to be able to see and access the data at any given time and point when needed. But most foundational concepts, CIA doesn’t have a creator, it was more of just three separate components that were established over time that then came into one big group. Which was proven by this sentence here, “It’s also not entirely clear when the three concepts began to be treated as a three-legged stool. But it seems to have been well established as a foundational concept by 1998 (Fruhlinger, 2020).” For example Paypal provides confidentiality because it not only asks you to sign into your account but it’ll also send a verification code to your phone to allow full access. Data integrity is presented by presenting you with information anytime an order is placed through them and last availability is shown because Paypal allows for their services to be used 24/7 whenever you want too. But all of this falls under one category/rubric which is confidentiality. This leads into authentication (encompress processes that allow systems to determine if a user is who they present themselves to be) and authorization (determines who has the right to access whatever data they need to get into). In conclusion the CIA is a great tool to use for planning your infosec strategy and get a foundation laid out for your organization. If you utilize each category correctly it can provide great security for important data.