{"id":278,"date":"2023-09-24T23:52:01","date_gmt":"2023-09-24T23:52:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bcwcyber\/?p=278"},"modified":"2023-09-24T23:52:01","modified_gmt":"2023-09-24T23:52:01","slug":"write-up-on-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bcwcyber\/2023\/09\/24\/write-up-on-the-cia-triad\/","title":{"rendered":"Write up on the CIA Triad"},"content":{"rendered":"\n<p>Name: Brayon Wesson<br>Date:  9\/17\/2023 <br><\/p>\n\n\n\n<p><strong>What is the CIA Triad?<\/strong> <br>In the cybersecurity world we use polices in many organizations and the model that is used for those policies is the CIA Triad model.  CIA stands for: Confidentiality, integrity, and availability. These three main factors are the building blocks to a company that is trying to build a secure base.  Some say that there is a need for a improvement for the triad but the foundation of the Triad stays the same no matter you spin it.<br>What goes into the CIA Triad?<br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><em><strong>The CIA Triad Comes with three parts: <\/strong> <\/em><br>\u2022 Confidentiality: is roughly equivalent to privacy. Confidentiality measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. Stringent measures can then be implemented according to those categories. (Wesley, 2022)<br>\u2022 Integrity: Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality). (Wesley,2022)<br>\u2022 Availability: means information should be consistently and readily accessible for authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information. (Wesley, 2022)<br><\/p>\n\n\n\n<p><strong><em>The Best way to use the CIA Triad is to use all components of it to the max: <\/em><\/strong><br>\u2022 With Confidentiality you must use Data that is encrypted and that has permissions that are up to date (Wesley, 2022)<br>\u2022 With Integrity You Should Ensure the employees are knowledgeable on regulatory requirements to bring human error to close to zero as possible. (Wesley, 2022)<br>\u2022 Availability use thins like redundancy and RAID to ensure all systems are updated, and also make sure there are data recovery methods. (Wesley, 2022)<br>\u2022 The Triad is something that was made overtime as defense industries began to rise in the USA, the three components were used to bring a building block to their combination. By 1998 we saw all of them come together to where we are today.   (Wesley, 2022)<br><br><br><strong><em>The difference between Authentication and Authorization<\/em><\/strong>                                                               <br>The difference between Authentication and authorization is something that is very distinct. All though they are both important they have a very distinct difference when it comes to the security world. <br>\u2022 Authentication is the process of confirming the identity of a user, Authentication verifies who you are. (oneLogin)<br>\u2022 Authorization is the process of giving a user pression to activate data behind some sort of blockage. (Okta, 2018)<br>Authentication is like using a username and password like logging into your MIDAS account, while Authorization checks what you can see with the login (i.e. Your Canvas and class schedule). <br><\/p>\n\n\n\n<p><strong><em>Conclusion<\/em><\/strong><br>In the cybersecurity world we use polices in many organizations and the model that is used for those policies is the CIA Triad model.  CIA stands for: Confidentiality, integrity, and availability. These three main factors are the building blocks to a company that is trying to build a secure base.  Some say that there is a need for an improvement for the triad, but the foundation of the Triad stays the same no matter you spin it. When it comes to Authentication and Authorization, we can see the many differences and what goes into the different things that is in cyber security. <br><br><strong><em>References<\/em><\/strong><br> Okta. (2018, October 15). Authentication vs. Authorization. Okta. https:\/\/www.okta.com\/identity-101\/authentication-vs-authorization\/ <br><\/p>\n\n\n\n<p>Authentication vs. authorization. (n.d.). OneLogin. https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization  <br><br>What is the CIA Triad_ Definition, Explanation, Examples &#8211; TechTarget.pdf. (n.d.). Google Docs. https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view <br><br><br><br><br><br><br><br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Brayon WessonDate: 9\/17\/2023 What is the CIA Triad? In the cybersecurity world we use polices in many organizations and the model that is used for those policies is the CIA Triad model. CIA stands for: Confidentiality, integrity, and availability. These three main factors are the building blocks to a company that is trying to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bcwcyber\/2023\/09\/24\/write-up-on-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27488,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/278"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/users\/27488"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/278\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/categories?post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/tags?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}