{"id":306,"date":"2024-04-08T03:31:42","date_gmt":"2024-04-08T03:31:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bbent24\/?p=306"},"modified":"2024-04-08T03:31:42","modified_gmt":"2024-04-08T03:31:42","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bbent24\/2024\/04\/08\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"The CIA Triad, a core idea in information security, consists of three key principles:<br \/>confidentiality, integrity, and availability. While integrity ensures that data is<br \/>accurate and reliable throughout its lifespan, confidentiality makes sure that only<br \/>authorized parties may access sensitive information. Availability guarantees that<br \/>data and resources are available when required. In the field of security,<br \/>authorization and authentication are two separate but connected ideas.<br \/>Authentication uses credentials, such as passwords or biometric information, to<br \/>confirm the identity of people or entities gaining access to a system. For instance, a<br \/>user must authenticate themselves by inputting their username and password when<br \/>they log into their email account. However, the activities or actions that<br \/>authenticated users are allowed to carry out within the system are determined by<br \/>authorization. It outlines permits and roles-based access privileges. Depending on<br \/>their allocated rights, the user in our email example may be allowed to read, write,<br \/>or delete emails following authentication. Both authorization and authentication are<br \/>essential for protecting sensitive data and preserving system integrity. While<br \/>authentication verifies identity, authorization establishes what may be done.<br \/>","protected":false},"excerpt":{"rendered":"<p>The CIA Triad, a core idea in information security, consists of three key principles:confidentiality, integrity, and availability. While integrity ensures that data isaccurate and reliable throughout its lifespan, confidentiality makes sure that onlyauthorized parties may access sensitive information. Availability guarantees thatdata and resources are available when required. In the field of security,authorization and authentication are&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bbent24\/2024\/04\/08\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":28614,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/posts\/306"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/users\/28614"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/posts\/306\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}