{"id":307,"date":"2026-05-02T23:42:46","date_gmt":"2026-05-02T23:42:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aiden-watson\/?p=307"},"modified":"2026-05-02T23:42:46","modified_gmt":"2026-05-02T23:42:46","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aiden-watson\/2026\/05\/02\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA triad is composed of con\ufb01dentiality, integrity, and availability. Which is the<br>foundation of the CIA model. The creation of the model can be traced to a 1976 U.S. Air Force-<br>commissioned study by the RAND Corporation, which emphasized the need to protect data<br>from unauthorized access (Turn &amp; Ware, 1976). This principle ensures that sensitive information<br>is only accessible to authorized individuals, using methods like encryption and access controls.<br>The I of CIA is the concept of integrity. Focusing on the accuracy and trustworthiness of data, it<br>was featured in a 1987 paper by Clark and Wilson. They highlighted that commercial computing<br>requires a focus on preventing unauthorized data modi\ufb01cation to maintain correctness (Clark &amp;<br>Wilson, 1987). Integrity is maintained through mechanisms like \ufb01le permissions and digital<br>signatures. The principle of availability came about the 1988 Morris Worm incident. Which<br>caused widespread internet disruptions, exposed the critical need for reliable and timely access<br>to information for authorized users (Federal Bureau of Investigation, 2018). Within this<br>framework, two critical concepts are authentication and authorization. Authentication is the<br>process of verifying a user&#8217;s identity. Authorization, which follows successful authentication<br>which determines what resources an authenticated user. A common analogy is airport security<br>showing a government-issued ID is authentication. While the boarding pass grants authorization<br>to board a speci\ufb01c \ufb02ight. Understanding these concepts is fundamental to implementing a<br>robust security posture.<\/p>\n\n\n\n<p><br>Clark, D. D., &amp; Wilson, D. R. (1987). A Comparison of Commercial and Military Computer<br>Security Policies. Proceedings of the 1987 IEEE Symposium on Security and Privacy, 184-194.<br>Federal Bureau of Investigation. (2018, November 2). The Morris Worm: 30 Years Since First<br>Major Attack on the Internet. FBI. Retrieved February 16, 2026,<br>from https:\/\/www.fbi.gov\/news\/stories\/morris-worm-30-years-since-\ufb01rst-major-attack-on-<br>internet-110218<br>Turn, R., &amp; Ware, W. H. (1976). Privacy and Security Issues in Information Systems. RAND<br>Corporation. https:\/\/www.rand.org\/pubs\/papers\/P5684.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is composed of con\ufb01dentiality, integrity, and availability. Which is thefoundation of the CIA model. The creation of the model can be traced to a 1976 U.S. Air Force-commissioned study by the RAND Corporation, which emphasized the need to protect datafrom unauthorized access (Turn &amp; Ware, 1976). This principle ensures that sensitive informationis &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/aiden-watson\/2026\/05\/02\/the-cia-triad\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The CIA Triad<\/span><\/a><\/p>\n","protected":false},"author":31891,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/posts\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/users\/31891"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/posts\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/posts\/307\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/media?parent=307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/categories?post=307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-watson\/wp-json\/wp\/v2\/tags?post=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}