Strengthening Cyber Security

Strengthening Cyber Security




BLUFF (Bottom Line Up Front)
With the help of the CIA Triad,confidentiality, honesty, and availability, information security is built on the basis of safe, accurate, and easy access data. Authorization establishes user privileges, while authentication confirms user identification; both are very important tools for upholding the CIA Triad’s tenets.


The CIA Triad

One well-known theory that I think directs information security procedures is the CIA Triad. Chai (2023) argues that the triad is made up of three linked components: Confidentiality Preventing unwanted access to data. Encrypting data, for instance, makes sure that the hackers cannot read credit card numbers that have been captured. • Integrity: Making certain that data is correct and unaffected. Digital signatures or hashing are frequently used to verify that documents or files have not been altered. • Availability: Ensuring that authorized users may access data and systems when they’re needed. Measures that guarantee availability include redundancy, backups, and defenses against denial-of-service (DoS) assaults (Fortinet, n.d.). It’s crucial to strike a balance between these three factors because concentrating too much on one could compromise the others.

Authentication vs. Authorization


Despite their frequent confusion, authorization and authentication are two different but related steps: The question, “Who are you?” is asked by authentication. I think that It involves using a bunch of credentials like passwords, fingerprints, or multiple logins to confirm identification (IBM, n.d.). For instance, using a password and one-time code to access an email account confirms the user’s identity. Authorization provides an answer to the ask, “What are you permitted to do. The system decides what resources or actions the user can access after identity verification . An employee might, for example, be logged into a corporate system but only have access to the files in their department, not the company database as a whole


Conclusion


Into my conclusion.The basis for safe information systems is provided by the CIA Triad availability, confidentiality, and integrity. Despite being separate procedures, authorization and authentication cooperate to uphold the triad. Authorization controls access privileges, whereas authentication confirms the identity of the user. When combined, they guarantee that data is safe, reliable, and accessible, promoting user confidence and organizational operations.


References
Chai, W. (2023). What is the CIA triad (confidentiality, integrity and availability)? TechTarget. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA
Fortinet. (n.d.). Authentication vs. authorization: What’s the difference? Fortinet CyberGlossary. https://www.fortinet.com/resources/cyberglossary/authentication-vs-authorization
IBM. (n.d.). Authentication vs. authorization: What’s the difference? IBM Think. https://www.ibm.com/think/topics/authentication-vs-authorization

Leave a Reply

Your email address will not be published. Required fields are marked *