{"id":290,"date":"2025-12-02T03:26:21","date_gmt":"2025-12-02T03:26:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/austinharendt\/?p=290"},"modified":"2025-12-02T03:26:21","modified_gmt":"2025-12-02T03:26:21","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/austinharendt\/2025\/12\/02\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left\"><strong>BLUF:<\/strong> CIA triad is a framework for those in the security field. CIA stands for confidentiality,<br>integrity, and availability.<br>          Confidentiality in summary, means privacy. It prevents other people from viewing<br>sensitive information on your cell phone or other devices. Integrity includes ensuring data<br>is up to par and will not end up in the hands of unknown users. Integrity is the second layer<br>of defense in case confidentiality goes down. Then there is availability. This is ensuring that<br>authorized users are able to access the information and documents they need for editing<br>and viewing. It also involves maintaining hardware and infrastructure. The CIA triad is<br>important because it is similar to a building block for cybersecurity, hence it is basic<br>information that everyone in the field should know in order to progress. Authentication<br>identifies users to ensure that access to information or a service is correctly given, similar<br>to integrity. An example of authentication includes cell phone passwords or face id on an<br>iPhone. Authorization is similar to availability and determines who has access to<br>information. An example of this would include sending a file to a friend where only her and I<br>could view it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: CIA triad is a framework for those in the security field. CIA stands for confidentiality,integrity, and availability. Confidentiality in summary, means privacy. It prevents other people from viewingsensitive information on your cell phone or other devices. Integrity includes ensuring datais up to par and will not end up in the hands of unknown users&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/austinharendt\/2025\/12\/02\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31627,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/users\/31627"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}