{"id":288,"date":"2024-09-24T23:58:57","date_gmt":"2024-09-24T23:58:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/?p=288"},"modified":"2024-09-24T23:58:57","modified_gmt":"2024-09-24T23:58:57","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/2024\/09\/24\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>Austin Hildenbrand<br>09\/15\/24<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">CIA Triad<br>The CIA triad is the basic fundamentals of what each technological department and<br>company should use. The triad consists of 3 disciplines: Confidentiality, Integrity, and<br>Availability. Each of these disciplines are designed to guide policies for information<br>security within a company (Chai Article, 1).<br>Confidentiality<br>Confidentiality is designed for the security of sensitive information. This can include, but<br>not limited to, unauthorized access attempts. This discipline includes a set of rules in<br>which the sensitive information is secured from unauthorized personnel.<br>Integrity<br>Integrity is the responsibility of the organization, in which the data being used is up to date<br>and unaltered. Integrity assures that sensitive information is uncorrupted and can only be<br>altered by authorized personnel. Integrity is the guidelines that companies follow, to<br>ensure security of information in transit is secured and cannot be accessed by<br>unauthorized personnel (Chai Article, 2).<br>Availability<br>Availability involves the consistency, in which information is accessible for authorized<br>personnel (Chai Article, 2). For example, if someone wishes to access their routing or<br>account number via website, then that information should only be accessed by the user<br>and provider.<br>Differences and Similarities<br>Many users of the CIA triad struggle with the interdisciplinary concepts of Availability<br>because of the confusion between Authentication and Authorization. Authentication is the<br>verification of a user or provider, while Authorization is the system\u2019s access privileges<br>given to the authorized personnel (The CIA Triad, Authentication, and Authorization, 1). A<br>good way to simplify this is how a rectangle can be a square, but a square can\u2019t always be<br>a rectangle. Authentication determines that the user is who they say they are. Then, follows<br>the guide of Availability into the system\u2019s permissions and allows the user to access the<br>information.<br>Why is the CIA Triad Important?<br>Each of the domains of the CIA triad work together, but also complement each other,<br>because if one were to fail, then the entire operation would fail. The Chai article says<br>\u201cConfidentiality, integrity, and availability together are considered the three most<br>important concepts within information security.\u201d When conducting business, the user\u2019s<br>and provider\u2019s information needs to stay secure and reachable, no matter the kind of<br>business being conducted.<br>Examples of Each Domain<br>When referring to Confidentiality the information of user and\/or provider needs to stay<br>safe. A way to prevent breaches is requiring Multi-Factor Authentication, where the human<br>user has required credentials and also a piece of information they know, like their dog\u2019s<br>name or an old address. This creates a more secure authentication and keeps information<br>confidential.<br>The guidelines of Integrity ensure the security of information in transit and at rest, which<br>can be secured by system permissions. Companies must ensure that information stays<br>secured while in transit to the user. The provider must also perform data checks to ensure<br>that data at rest has not been altered and\/or is still accessible.<br>Availability is involved in each discipline of the triad, but examples include, but are not<br>limited to; server crashes, or a user being locked out by another party, such as a black-hat<br>hacker. It is the provider\u2019s responsibility to ensure the required information is accessible<br>and if it\u2019s not, then it\u2019s the provider\u2019s responsibility to fix it.<br>Conclusion<br>The CIA Triad is the basic guidelines, in which a company or provider must follow, in order<br>to ensure the security of information technology. The interdisciplinary requirements of<br>each domain intertwines, but it\u2019s important for the company to distinguish each domain and<br>maintain stability within the triad. Ultimately, it\u2019s the provider\u2019s responsibility for all of the<br>disciplines to remain intact, in order to properly conduct business with a user. If one of<br>these domains fail, then the provider must resolve it.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Works Cited<br>Chai Article, 06-28-2022<br>What is the CIA Triad_ Definition, Explanation, Examples &#8211; TechTarget.pdf &#8211; Google Drive<br>The CIA Triad, Authentication, and Authorization, 04-19-2022<br>The CIA Triad, Authentication, and Authorization | Ryan Moss (odu.edu)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Austin Hildenbrand09\/15\/24 CIA TriadThe CIA triad is the basic fundamentals of what each technological department andcompany should use. The triad consists of 3 disciplines: Confidentiality, Integrity, andAvailability. Each of these disciplines are designed to guide policies for informationsecurity within a company (Chai Article, 1).ConfidentialityConfidentiality is designed for the security of sensitive information. This can include,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/2024\/09\/24\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29846,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/users\/29846"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/posts\/288\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinhildenbrand\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}