{"id":293,"date":"2025-09-26T12:47:53","date_gmt":"2025-09-26T12:47:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/?p=293"},"modified":"2025-11-13T03:08:15","modified_gmt":"2025-11-13T03:08:15","slug":"293","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/2025\/09\/26\/293\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Amanda Coleman<br>CYSE 200T<br>09\/14\/2025<br>Professor T. Duvall<\/p>\n\n\n\n<p class=\"has-text-align-center\">The CIA Triad in Cyber Security<\/p>\n\n\n\n<p class=\"has-text-align-left\">BLUF: This report defines the concept of the CIA triad and the difference between<br>Authentication and Authorization. <\/p>\n\n\n\n<p>\u201cThe concept of the CIA triad formed over time and does not have a single creator\u201d (W.Chai) The CIA triad is a cybersecurity framework used by IT professionals to effectively manage information security. It consists of Confidentiality, Integrity and Availability.<\/p>\n\n\n\n<p>Confidentiality<br>Confidentiality means keeping the information secure from persons or entities not allowed<br>access to it. The more valuable the information, the more access to it is restricted. Maintaining<br>confidentiality reduces the risk of both insider and outsider threats. Confidentiality can be<br>achieved through user access controls, password protection or two factor authentication.<br>Access once given to former employees should also be promptly revoked.<\/p>\n\n\n\n<p>Integrity<br>Integrity is the reliability and accuracy of the information. As data is transmitted, it must be<br>protected from modification by unauthorized parties or damage to files. For example, a cash<br>transaction done via a money transfer app must ensure that the intended recipient gets the<br>amount transferred, and an encrypted email should contain the correct data while securely<br>sent. Integrity also entails keeping data properly backed up so it can be retrieved in the event of<br>a system shut down and operations can resume.<\/p>\n\n\n\n<p>Availability<br>Availability means ensuring that all parties that are allowed to access the data can do so<br>anytime that data is needed. The system must maintain functionality during its high traffic times<br>and give adequate notice when temporary shutdown is needed for maintenance. For example, a<br>bank\u2019s main website has scheduled maintenance, the mobile app should be available for<br>customers to access their account information securely and the physical branches should<br>operate normally.<\/p>\n\n\n\n<p>Authorization vs Authentication<br>Authorization describes entities that have been given expressed permission to access<br>information. These parties can be customers or owners of the data or employees with a need<br>to-know position. In a military organization, authorization to access information is determined<br>by the level of clearance assigned to the personnel. Authentication is the process by which prior<br>authorization is verified and protected. Many businesses use multiple factors when creating<br>user accounts to reduce the risk of accidental or intentional breach of access controls. These<br>can include the use of biometrics or security codes as a second layer of protection after the<br>correct password is entered.<\/p>\n\n\n\n<p>Conclusion:<br>The CIA triad is the foundation of a strong cyber security framework. It encompasses all the<br>areas from which threats can arise and gives rise to a well-rounded approach to information<br>security.<\/p>\n\n\n\n<p>References:<br>\u201cWhat is the CIA triad? Definition. Explanation. Examples.\u201d Wesley Chai<br>Google AI search<br>https:\/\/www.google.com\/search?q=cia+triad&amp;oq=CIA+&amp;gs_lcrp=EgZjaHJvbWUqCggDEAAYsQMY<br>gAQyBggAEEUYOTIKCAEQABixAxiABDINCAIQABiDARixAxiABDIKCAMQABixAxiABDIKCAQQABixAx<br>iABDIHCAUQABiABDIHCAYQABiABDINCAcQABiDARixAxiABDIKCAgQABixAxiABDIHCAkQABiABNI<br>BCTk4MjRqMGoxNagCCLACAfEF6R6ziAA-JUnxBekes4gAPiVJ&amp;sourceid=chrome&amp;ie=UTF-8<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amanda ColemanCYSE 200T09\/14\/2025Professor T. Duvall The CIA Triad in Cyber Security BLUF: This report defines the concept of the CIA triad and the difference betweenAuthentication and Authorization. \u201cThe concept of the CIA triad formed over time and does not have a single creator\u201d (W.Chai) The CIA triad is a cybersecurity framework used by IT professionals&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/amanda-coleman\/2025\/09\/26\/293\/\">Read More<\/a><\/div>\n","protected":false},"author":31529,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/users\/31529"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/posts\/293\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amanda-coleman\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}