CIA Triad

Bluf( Bottom line up front)– What exactly is the CIA triad and why do companies utilize it?
The CIA triad is a process that businesses use to protect information data and provide general security within the company. In this write up, I will be explaining the importance of
the CIA Triad, then later on talk about the differences between authorization and
authentication. ⇩
→Explanation- CIA Triad
The CIA triad is a guide to direct the policies for data security with an organization. All
of the key factors that make up the CIA triad are confidentiality, integrity, and availability. (Chai,
2022). These are very important in cybersecurity since all three of them as a whole create a good
process for companies to use. Availability makes sure that you can rely on and access the
information by certified individuals. Next, integrity assures everyone that the information is legit and dependable. Lastly, confidentiality is the arrangement of steps that minimizes the access to
that specific information. (Chai, 2022). This framework is a fantastic way to improve, protect,
and trust data in your company. (Coursera, 2022).
→Confidentiality is what helps the businesses information protect and minimizes the
information just enough to where peoples’ files and data are secured in safe spots without disclosing a lot of data. To prevent hacking and the information from getting into the wrong
hands, businesses have to determine who can switch or update any of their data. (Coursera, 2022)
Integrity – An example is if the electricity were to go out due to a natural disaster, then the
business makes sure to keep any past information and to back it up so none of it is lost.
Accessibility is when companies allow certain people in that business to have access to files through email that are trusted. (Coursera, 2022).
→Authentication vs. Authorization
Authorization comes afterwards and makes sure the person is granted permission to view the information or not. Meanwhile, authentication is checking the individual’s verification,
as well as their identification to see if they are the correct user/person. An example of
authentication is when you are trying to log in to your account or the duo mobile that we use to
log into our student accounts for college. (GG, 2022) Then for authorization they usually will use a web token or other forms of authorization tactics.
In conclusion, authorization, authentication, and the CIA triad are forms in helping people in charge manage their organizations data security. These processes can be beneficial for
them to use even though it is a simple act, it can protect a lot of individuals from getting information stolen and broken into.

Leave a Reply

Your email address will not be published. Required fields are marked *