{"id":282,"date":"2024-09-23T01:42:51","date_gmt":"2024-09-23T01:42:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/?p=282"},"modified":"2024-09-23T01:42:51","modified_gmt":"2024-09-23T01:42:51","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/2024\/09\/23\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">This report describes what the CIA Triad is and how important it is in securing our<br>networks, the difference between authorization and authentication within a system, and shows<br>why the Triad is a crucial framework to protect sensitive information in various environments at<br>all times to ensure data security, accuracy, and accessibility.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Description of the CIA Triad<br><\/strong>The CIA Triad is a model for understanding and implementing security measures in<br>information systems. The first key part of the CIA is confidentiality which just means to ensure<br>that information is kept private. Confidentiality is key because there are plenty of new ways for<br>hackers to get into unauthorized systems. Referring to this article it said, \u201cThese direct attacks<br>may use techniques such as man-in-the-middle (MITM) attacks, where an attacker positions<br>themselves in the stream of information to intercept data and then either steal or alter it\u201d<br>(Fortinet, 2024), this right here is a breach of confidentiality and that&#8217;s something you don&#8217;t want.<br>Next key part is integrity which ensures that the information stays accurate and unaltered. It\u2019s<br>about making sure data in transit isn&#8217;t tampered with or changed without your permission. The<br>final key part is availability; this ensures information is accessible when needed. These three<br>components work together to protect data and secure networks.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Authentication vs. Authorization<\/strong><br>Verifying someone&#8217;s identity is the process of authentication. It\u2019s like checking an ID to<br>confirm someone\u2019s identity. For example, when you enter a username and password to log into a<br>system, you are being authenticated. Verifying which files, apps, and data a user can access are<br>the authorization process. For example, once you are logged into the system, authorization<br>decides what you are allowed to do, like accessing certain files or using specific features. By<br>using this layered approach, it is possible to guarantee that only authorized users will have access<br>to sensitive data and that their access will be limited to what is allowed.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>Conclusion<br><\/strong>In conclusion, the CIA Triad- confidentiality, integrity, and availability- is fundamental<br>for securing our networks and protecting sensitive information. The Triad provides a<br>comprehensive framework for maintaining data security. Understanding the difference between<br>authentication and authorization only further strengthens this model.<br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This report describes what the CIA Triad is and how important it is in securing ournetworks, the difference between authorization and authentication within a system, and showswhy the Triad is a crucial framework to protect sensitive information in various environments atall times to ensure data security, accuracy, and accessibility. Description of the CIA TriadThe CIA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/2024\/09\/23\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29793,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/users\/29793"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/282\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}