The CIA Triade and Security

CIA Triade

The CIA Triade includes Confidentiality, integrity, and availability. Confidentiality is another form of privacy. When you want to keep something confidential only a certain group of people know this information or none at all besides yourself. There are usually high measures in place to keep the information confidential. Depending on the type of information it can be as simple as being given a keycard to access a room or as complex as working for years to gain clearance. A basic example of keeping information confidential is changing your password for an account you have. It will ask for your email and send you a link to change the password. If this change wasn’t activated by you it can be stopped by clicking “Not me”. Wesley Chai. (2022)

Integrity is keeping information consistent. No information is allowed to be changed without everyone being aware of it. This ensures that nothing can be altered and given to those who are not authorized to view such classified information. Constant checks for information changes must be performed so that any breaches can be detected as quickly as possible. An example of this is various notions put in place to stop unauthorized access such as passwords, personal questions, or button click authorizations sent to your phone by text. Wesley Chai. (2022)

Availability is always having a backup. Having the materials constantly available is how you keep a machine running forever. Things will always go wrong but if you have the people, the parts, and the means it’s possible to fix the problem. Doing checkups on the hardware is the best way to prevent future problems and allow for more efficient workflows. For example, if a computer were to have its hard drive destroyed there should be others on sight to replace it.

Authentication and Authorization

Authentication and authorization are two different concepts that work in tandem with each other. Authentication is verifying one’s identity like a first and last name. Everyone should have this and match their birth certificate if they want to be identified. There are also different types of identification cards. Drivers licenses, state ID’s, or Military ID’s.

Authorization is the privilege that the authentication gives. A driver’s license allows one to drive and a Military ID allows a person to enter a military base. Driver permits allow for young teens 15 and six months of age to drive with a licensed passenger who is 18 or older. More than just licenses there are age requirements and tests that give access to certain things. A good example is being 18 years old to be considered an adult and 21 years old to drink alcohol. Another example is getting certified for a job such as lifeguarding. The lifeguard pre-test must be passed with proof of passing to get the position.

Conclusion
The CIA Triad, authentication, and authorization play large roles in cybersecurity. Without these pieces of protection put in place, all information would be accessible to everyone who wants it. These are important aspects that make up cybersecurity and its general purpose. Being able to understand this information in its entirety could benefit anyone no matter the career, age, or lifestyle.

Reference list: Wesley Chai. (2022) What is the CIA Triad? Definition,
Explanation, Examples

Leave a Reply

Your email address will not be published. Required fields are marked *