Home

Cybersecurity E-Portfolio — Homepage

Welcome

Hello, and welcome to my cybersecurity e-portfolio. My name is Nassarrio Ashley, and I am a cybersecurity student focused on protecting digital systems, understanding cyber threats, and helping organizations manage risk in an increasingly connected world. This portfolio highlights my academic work, technical skills, projects, and professional goals as I continue developing my career in cybersecurity.

Cybersecurity is more than just technology — it is about critical thinking, ethics, problem-solving, and protecting people and information. Through my studies, I have gained experience with core security concepts such as risk management, network defense, digital privacy, and security frameworks.


About Me

I am currently studying cybersecurity with an interest in areas such as governance, risk, and compliance (GRC), cyber law, and security operations. My academic journey has allowed me to explore both the technical and legal sides of cybersecurity, helping me understand how policies, regulations, and technology work together to protect organizations.

Some of my strengths include:

  • Analytical thinking and problem solving

  • Understanding cybersecurity frameworks and best practices

  • Research and technical writing

  • Ethical decision-making in technology


What You’ll Find in This Portfolio

This e-portfolio showcases my growth as a cybersecurity student and highlights the skills I am building throughout my education.

Projects & Coursework
Examples of assignments, research papers, and cybersecurity analyses that demonstrate my understanding of current threats and security strategies.

Skills & Tools
Technical and professional skills I am developing, including cybersecurity concepts, risk analysis, and security awareness.

Career Goals
My long-term goal is to work in a cybersecurity role that combines technology, law, and policy — helping organizations stay secure while navigating evolving regulations.

Certifications & Learning
Ongoing training, certifications, and coursework that support my professional development.


My Mission

My mission is to contribute to a safer digital environment by combining cybersecurity knowledge with ethical responsibility. As technology continues to evolve, I aim to stay adaptable, continuously learn, and apply cybersecurity principles that protect both individuals and organizations.

 

 

Business Writing project 

The CIA Triad and Authentication vs. Authorization
 Nassarrio Ashley
 Old Dominion University
 Cyse 200T
 February 17, 2026

 

 

Introduction

The CIA Triad is a foundational cybersecurity model used to guide information security policies within organizations. According to Chai (2022), the three core principles are confidentiality, integrity, and availability. Together, these concepts help organizations protect data, maintain trust, and ensure systems remain operational. Understanding the CIA Triad is essential for cybersecurity professionals because it provides a framework for evaluating risk and designing secure system whitin the law and regulation we have in the United States. It is used as a frame work to response to cyber threats like most thing in cyber  security things are handed through frame works to work within compliance.

Confidentiality

Confidentiality refers to protecting information from unauthorized access. Organizations implement confidentiality through encryption, strong passwords, multi factor authentication, and access controls. The goal is to make sure only approved users can view sensitive data. For example, when a student logs into a university portal using secure credentials, confidentiality prevents outsiders from accessing grades or personal information. Sensitivity data falls into many category such as medical military and financial recorders confidentiality is one of the most important parts of cyber security because cyber criminals  are going after private information to sell or use for Ransome.

Integrity

Integrity ensures that data remains accurate, consistent, and trustworthy throughout its lifecycle. This means information cannot be altered without authorization. Techniques such as checksums, version control, logging, and backups help preserve integrity. For instance, in online banking, transaction records must remain unchanged so users and institutions can trust financial data. Integrity also intel’s when information is leaked and the users need to know. Many company’s do not do this

Availability

Availability guarantees that authorized users can access information and systems when needed. Maintaining hardware, updating software, monitoring networks, and using backups or redundancy all support availability. A good example is a cloud service that stays online during heavy traffic due to failover systems and disaster recovery planning.

Authentication vs. Authorization

Authentication and authorization are closely related but serve different purposes in cybersecurity. Authentication is the process of verifying a user’s identity, while authorization determines what that verified user is allowed to do. Authentication answers the question “Who are you?” whereas authorization answers “What can you access?”

Example:
 When a student logs into a college learning platform, entering a username and password or completing multi factor authentication proves their identity, which is authentication. After logging in, the system decides whether the student can view assignments, submit work, or access administrative tools. Those permissions represent authorization. Even if two users successfully authenticate, they may have different authorization levels depending on their role.

Conclusion

The CIA Triad remains a core model for cybersecurity because it emphasizes protecting privacy, maintaining trustworthy data, and ensuring consistent system access. Authentication and authorization work alongside these principles by confirming user identity and controlling access rights. Together, these concepts form the backbone of modern information security practices.

References

Chai, W. (2022, June 28). What is the CIA triad? Definition, explanation, examples. TechTarget.

 

 

 

The CIA Triad and Authentication vs. Authorization
 Nassarrio Ashley
 Old Dominion University
 Cyse 200T
 February 17, 2026

 

 

Introduction

The CIA Triad is a foundational cybersecurity model used to guide information security policies within organizations. According to Chai (2022), the three core principles are confidentiality, integrity, and availability. Together, these concepts help organizations protect data, maintain trust, and ensure systems remain operational. Understanding the CIA Triad is essential for cybersecurity professionals because it provides a framework for evaluating risk and designing secure system whitin the law and regulation we have in the United States. It is used as a frame work to response to cyber threats like most thing in cyber  security things are handed through frame works to work within compliance.

Confidentiality

Confidentiality refers to protecting information from unauthorized access. Organizations implement confidentiality through encryption, strong passwords, multi factor authentication, and access controls. The goal is to make sure only approved users can view sensitive data. For example, when a student logs into a university portal using secure credentials, confidentiality prevents outsiders from accessing grades or personal information. Sensitivity data falls into many category such as medical military and financial recorders confidentiality is one of the most important parts of cyber security because cyber criminals  are going after private information to sell or use for Ransome.

Integrity

Integrity ensures that data remains accurate, consistent, and trustworthy throughout its lifecycle. This means information cannot be altered without authorization. Techniques such as checksums, version control, logging, and backups help preserve integrity. For instance, in online banking, transaction records must remain unchanged so users and institutions can trust financial