Name: Sean Williams
Date: 1/29/2023
BLUF
This paper is ideally a deeper explanation of what the CIA triad is and what it does in the
business scene. It will also explain what authentication and authorization are, then show
how different the two are.
CIA Triad
The Cia Triad came to be around 1998 through the combination of 3 concepts that sew the
group together: Confidentiality, Integrity, and Availability. Confidentiality helps set rules when it
comes to looking a certain info online, availability is to show how the information for those who
are authorized to it can get it anytime, integrity is the assurance that the information is reliable
and can be something you can put your faith in. This creates one of the most widespread,
strongest cybersecurity foundations that guides information through the organization where no
outside party can break in and see. Not only is the organization popular for its protection, but it
can also be more beneficial when it comes down to collecting information. Though over the
years they seem to need an upgraded sense one of their biggest problems is with having enabled
devices to go unpatched and get set with weak passwords.
Authentication Vs Authorization
Both mentioned terms can be seen as the same but have entirely different roles in online data
and in securing your protection as well. Authorization is the process to confirm what a person
has control over. For example, authorization is like being able to play and mess around with your
friends because they know you, but it’s not allowed to play and mess around with a teacher
because it’s prohibited to do that in class. While authentication is the process of confirming who
the user is making themselves know. For example, authentication is like knocking on your
house door and having you ask who it is, which then you say it’s you and sometimes give a
password letting know it’s you are let in. Though both of the terms even though they are
different, are essential for keeping security on the web and keeping the information coming from
outsiders.
Conclusion
Now that we understand the importance of knowing why confidentiality, Integrity, and Availability
should always hold true in such an environment as the CIA triad. Without having it nothing
online is able to be protected and anybody can steal info like dark companies that plan to use it
to hurt them. This also explains how why knowing the difference between both Authentication
and Authorization put effort into securing people online and keeping their
information the same for people who don’t have the proper authentication for the devices so they
can be denied authorization to their information.