CIA Triad

Confidentiality, integrity, and availability are what is known as the CIA triad. This triad
is a guide on how to operate in the cybersecurity field; concepts that are the guidelines for good
technology fields. In the importance of this, this plays a role in maintaining your data safe and
protected from threats ( Mrinial Prakash).

Three Key Concepts
The first concept, confidentiality, is to ensure that information is private and protected.
Confidentiality in the workplace or a professional environment is of utmost importance.
Protecting data in the workplace amongst employers can fall into compliance with many federal and state regulations. For example, not every employer is authorized to see data in banking or in a government agency. Authoritarian representatives are needed to make sure the data is protected, especially when sharing information. So, using this concept data should be handled
based on the organization’s required privacy (Wesley Chai). Integrity is the honesty or virtue of
data that is reliable and accurate. If your company provides information about senior managers
on your website, this information needs to have integrity. If it is inaccurate, those visiting the
website for information may feel your organization is not trustworthy. If you want to have a
good company, it must be a two-way street between the employers and the consumers. Not
implementing virtue keeps the organization at risk if information leaks out. Lastly is availability,
which is when “systems are available to individuals under the circumstance, like power outages
or natural disaster.” I remember when Hurricane Ian put a great toll on Florida causing people to
lose power which led to searches. Having availability provides the immediate function of the
system that is working. “Countermeasures to help guarantee availability include redundancy in
servers, internal networks, applications.’’ This guided application makes sure everything is
ensured.

Authentication & Authorization
Now relating to the CIA Triad, how does this play a role and authentication and
authorization in the workplace? Authentication “verifies the identity of a user or service, and
authorization determines their access rights.” When I think of authentication it looks back to
confidentiality and integrity because you want to make sure that your data systems are secure
and have access to vulnerable information. For example, governments use different
authentication techniques to protect their currency from counterfeiting. When I think of
authorization it is the accomplice of the distinct levels of security and who has the right to look
over data.


CONCLUSION
In conclusion, the CIA triad is a great mechanic for teaching. Just like the NIST
framework this ties into the CIA triad. The information that this triad offers shows how valuable
it is to the company to implement these key concepts.





Works Cited

Prakash, Mrinal. “CIA Triad in Cyber Security: Definition, Examples, Importance.”
Knowledgehut.com, 23 Jan. 2023, www.knowledgehut.com/blog/security/cia-in-cyber-security.
Accessed 28 Jan. 2023.
“Authentication vs. Authorization: What’s the Difference?” OneLogin,
www.onelogin.com/learn/authentication-vs-authorization.
“What Is the CIA Triad and Why Is It Important?” Fortinet,
www.fortinet.com/resources/cyberglossary/cia-triad.
“Confidentiality, Integrity, and Availability in Cyber Security.” Kobalt.IO,
kobalt.io/blogpost/confidentiality-integrity-and-availability-in-cyber-
security/#:~:text=The%20final%20component%20of%20the,power%20outages%20or%20natura
l%20disasters.
Chai, Wesley. “What Is the CIA Triad? Definition, Explanation, Examples –
TechTarget.” WhatIs.com, TechTarget, 28 June 2022,
[Last Name] 4
www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-
CIA#:~:text=Confidentiality%2C%20integrity%20and%20availability%2C%20also,information
%20security%20within%20an%20organization.









Leave a Reply

Your email address will not be published. Required fields are marked *