{"id":284,"date":"2023-12-08T00:48:19","date_gmt":"2023-12-08T00:48:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/?p=284"},"modified":"2023-12-08T00:48:19","modified_gmt":"2023-12-08T00:48:19","slug":"c-i-a-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/2023\/12\/08\/c-i-a-triad\/","title":{"rendered":"C.I.A Triad"},"content":{"rendered":"\n<p>Defending Your Data<br>The CIA triad is a system composed of three key parts to help keep information safe.<br>The three parts are confidentiality, integrity and availability. These three elements help keep<br>data and information safe. Authentication is making sure a person matches their info they give<br>you and authorization is if you have permission to access certain information or tools.<br>CIA Triad<br>The CIA triad uses its three components to maximize the security of information in an<br>organization. The first component is confidentiality. This component is the first component that<br>comes to people&#8217;s mind when talking about keeping data safe but it has many aspects to it. A<br>prime example of an aspect of confidentiality is in online banking and requires a person to entire<br>their specific routing number and also two factor authentication.(Chai, 2022) The second<br>component is integrity. An example of integrity being used to protect data is organizations<br>setting up protocols and rules on who can edit the data so there isn&#8217;t any data that is leaked or<br>deleted because of mistakes. The final component of the CIA is availability. The reason why<br>availability is important is because if there is a cyberattack on your organization and you are<br>forced to shut down and limit the availability of data the organization or company will have to<br>stop all production.(Chai, 2022)<br>Authentication vs Authorization<br>Authentication is when you verify a person&#8217;s information or credential so they can<br>access their data. Typically you will see this when attempting to log in to many websites. The<br>most common form of authentication is the two factor authentication where once you put your<br>login information in the website that you are logged into may send a code to you phone number<br>or email to verify that it is you logging in. Authorization is the extent of information that you can<br>see based on your information. A prime example of this is with social media and if someone has<br>a private account and you do not follow them then you are authorized to see their<br>profile.(Weatherston, 2022)<br>Conclusion<br>To conclude, what I have learned from researching about these two connected topics is that<br>keeping your organization&#8217;s data safe is one of the most important aspects of any organization.<br>An organization must use and tailor all aspects of the CIA to their needs for optimal security.<br>References<br>Chai, W. (2022). What is the CIA Triad? Definition, Explanation and Examples.<br>TechTarget.<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br>Weatherston, G. (2022, September 29). Authentication vs Authorization \u2013 What\u2019s the<br>Difference? FreeCodeCamp.org.<br>https:\/\/www.freecodecamp.org\/news\/whats-the-difference-between-authentication-and-a<br>uthorisation\/<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defending Your DataThe CIA triad is a system composed of three key parts to help keep information safe.The three parts are confidentiality, integrity and availability. These three elements help keepdata and information safe. Authentication is making sure a person matches their info they giveyou and authorization is if you have permission to access certain information&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/2023\/12\/08\/c-i-a-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27631,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/users\/27631"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/284\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}