{"id":274,"date":"2023-09-24T22:19:52","date_gmt":"2023-09-24T22:19:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/angelol\/?p=274"},"modified":"2023-09-24T22:19:52","modified_gmt":"2023-09-24T22:19:52","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/angelol\/2023\/09\/24\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>The CIA triad is broken up into three separate parts which include confidentiality, integrity, and availability. Confidentiality is the privacy of certain things, or in other words making sure that private information doesn\u2019t fall into the wrong hands. You can make sure you have confidentiality by making sure the information is kept in a small circle, making sure information is locked up or requires a passcode to get into it, or keeping records hard copy and locked up. Integrity is making sure that data is right and trustworthy. While you have to make sure your work or records are confidential, you also have to make sure it is correct. Over time, data may be changed, which is why you need integrity to make sure your information accurate. You can do this by having programs that keeps data protected and accurate, which is where your confidentiality plays a part. Lastly, availability is making sure that the right information can be reached by the right people. This means making sure records or documents are in the right place and maintaining any passcodes you may have to get into these documents or records. You also need to maintain any hardware and making sure anything is fixed if it goes wrong. <br><br>\tWhile authentication and authorization may be thought of as the same, authentication determines if this user is a user in the system or not while authorization shows the user\u2019s permissions and what they\u2019re able to do in the system. An example of authentication is when you log in to MIDAS and it sends you authentication codes. An example of authorization is when you\u2019re in the military and you have authorization to do certain things with your rank.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is broken up into three separate parts which include confidentiality, integrity, and availability. Confidentiality is the privacy of certain things, or in other words making sure that private information doesn\u2019t fall into the wrong hands. You can make sure you have confidentiality by making sure the information is kept in a small&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/angelol\/2023\/09\/24\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27374,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/users\/27374"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":278,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/posts\/274\/revisions\/278"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angelol\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}