{"id":282,"date":"2026-02-19T03:58:31","date_gmt":"2026-02-19T03:58:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bcagl\/?p=282"},"modified":"2026-02-19T03:58:31","modified_gmt":"2026-02-19T03:58:31","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bcagl\/2026\/02\/19\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"The CIA Triad, which is the abbreviated term for Confidentiality, Integrity, and Availability, is a model designed to guide policies for safeguarding security systems (&#8220;What is the CIA triad,&#8221; n.d.). The confidentiality aspect of the triad is utilized in ensuring that sensitive data is kept classified and accessible to only those who are authorized to access it (&#8220;What is the CIA triad,&#8221; n.d.). Measures that keep sensitive data confidential could be in ways such as classifying and labeling restricted data, enabling access control policies, encrypting data, and utilizing the usage of multi-factor authentication systems (&#8220;What is the CIA triad,&#8221; n.d.). The integrity aspect of the triad is utilized by ensuring that the sensitive data is trustworthy and free from tampering (&#8220;What is the CIA triad,&#8221; n.d.). In turn, integrity of sensitive data is only maintained if the data is authentic, accurate, and reliable (&#8220;What is the CIA triad,&#8221; n.d.). A method of maintaining the integrity of data to ensure its reliability may show in requiring digital signatures (&#8220;What is the CIA triad,&#8221; n.d.). Furthermore, the final aspect of the triad is the availability aspect. The availability aspect ensures that sensitive data is available to those who are authorized to access it. Ensuring that the information is available to access through programs or security measures outside of the primary system when it is disrupted is a priority to promote availability (&#8220;What is the CIA triad,&#8221; n.d.). <br \/><br \/>Authentication is the initial step in the security process of confirming the identity of the user (&#8220;Authentication,&#8221; n.d.). To confirm the identity of the user, the user may have knowledge of information to get into security systems or have physical verification such as ID, keys, keycards, biometrics, etc (&#8220;Authentication,&#8221; n.d.). On the other hand, authorization is the process of allowing the user to access a physical location or an information-based system (&#8220;Authentication,&#8221; n.d.). The key difference between them is that authentication verifies user identity using credentials, while authorization determines the access permissions for an authorized user (&#8220;Authentication,&#8221; n.d.). Authentication precedes authorization, but both are equally important to maintain the security of physical locations and information-based systems (&#8220;Authentication,&#8221; n.d.).<br \/> <br \/><br \/>References <br \/><br \/>Authentication vs authorization: Key differences. Fortinet. (n.d.). https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization <br \/><br \/>What is the CIA triad and why is it important?. Fortinet. (n.d.). https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad ","protected":false},"excerpt":{"rendered":"<p>The CIA Triad, which is the abbreviated term for Confidentiality, Integrity, and Availability, is a model designed to guide policies for safeguarding security systems (&#8220;What is the CIA triad,&#8221; n.d.). The confidentiality aspect of the triad is utilized in ensuring that sensitive data is kept classified and accessible to only those who are authorized to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bcagl\/2026\/02\/19\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32172,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/users\/32172"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcagl\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}