The CIA Triad is an information security model that is used to guide an organization’s policies or attempts, so the data can be secured. The three letters stand for confidentiality, integrity, and availability. Confidentiality is when only authorized users or processes can access and modify data. Integrity is when data has to be maintained in the correct state and nobody can be able to modify the data. Availability is when authorized users have permission to access data whenever they need to. In a 1976 US Air Force study, the concept of confidentiality in the field of computer science was formed. Integrity was an idea that was recognized in a 1987 paper that explained about the specific needs around accountess and data correctness. Availability was discussed in 1988 when the Morris worm knocked a portion of the unhatched internet offline. The confidentiality part of the CIA Triad is split between two part authorization and authentication. Authorization can determine who has the right to access data. If a system knows who you are, doesn’t mean all data will be opened to you. During authorization, confidentiality is enforced by a need to know mechanism to access data. Confidentiality is enforced in operating systems, so many creators or users can have access to many files that are only available to them. Authentication is when processes are enclosed to allowed systems to see if a user is who they say they are. Authentication establishes integrity by using passwords and other techniques such as biometrics, security tokens, and cryptographic keys. For example, an office requires employees to scan their IDs and enter a password to enter their workplace, so they can be authenticated. The employees would have to verify that they have the right to enter or access a specific floor of the building using authorization. These are the components and operations that keep the CIA Triad intact.
References
Fruhlinger, J. (2020). The CIA Triad: Definition, components, and examples.
Spacey, J. (2016, November 25). Authentication vs Authorization. simplicable.com. Retrieved September 20, 2021, from https://simplicable.com/new/authentication-vs-authorization#:~:text=%20Authentication%20is%20the%20process%20of%20verifying%20identification.,owner%20of%20the%20card%20by%20validating%20the%20pin.