{"id":282,"date":"2024-02-04T18:38:13","date_gmt":"2024-02-04T18:38:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bfont002\/?p=282"},"modified":"2024-02-04T18:38:13","modified_gmt":"2024-02-04T18:38:13","slug":"understanding-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bfont002\/2024\/02\/04\/understanding-the-cia-triad\/","title":{"rendered":"Understanding the CIA Triad"},"content":{"rendered":"Brenda Fontana<br \/>Understanding The CIA Triad<br \/>What is the CIA Triad and when do we need it?<br \/>The CIA Triad is the base of information security, highlighting confidentiality, integrity,<br \/>and availability, and providing a framework with policies to guide organizations (Hashemi-Pour<br \/>&amp; Chai, 2023). Confidentiality involves ensuring privacy by limiting access to sensitive<br \/>information, with methods such as encryption, access controls, and user training. Integrity<br \/>focuses on maintaining data accuracy and trustworthiness, with techniques such as version<br \/>control, checksums and digital signatures to identify and prevent unauthorized alterations.<br \/>Availability guarantees consistent and authorized access. All three principles together are<br \/>considered the base of information security.<br \/>Authentication vs. Authorization<br \/>The concepts of authentication and authorization go together in most contexts of<br \/>information security. Authentication ensures users are who they claim to be, and upon<br \/>verification, Authorization states the level of access granted (Hashemi-Pour &amp; Chai, 2023). For<br \/>instance, a user logging in with a username and password (Authentication) is also authorized to<br \/>view, edit, or delete files based on assigned permissions (Authorization). An example that I<br \/>believe could apply to this is Canvas. It contains information, different users that work within it,<br \/>active communication in various ways, and it is protected by authentication and verification to<br \/>log in; furthermore, depending on what role you have in the platform or organization that<br \/>controls it, you have different levels of access to the information in it. It is not the same to log in<br \/>from my account, than logging in from a professors account.<br \/>Conclusion<br \/>In conclusion, the CIA Triad provides a framework for information security, emphasizing<br \/>confidentiality, integrity, and availability. Authentication and authorization, two important<br \/>components of this framework, contribute to securing systems that contain sensitive, private<br \/>information. Authentication establishes identity, while authorization dictates the level of access<br \/>that will be available to authenticated users, representing the principle of information security<br \/>that the system supports.","protected":false},"excerpt":{"rendered":"<p>Brenda FontanaUnderstanding The CIA TriadWhat is the CIA Triad and when do we need it?The CIA Triad is the base of information security, highlighting confidentiality, integrity,and availability, and providing a framework with policies to guide organizations (Hashemi-Pour&amp; Chai, 2023). Confidentiality involves ensuring privacy by limiting access to sensitiveinformation, with methods such as encryption, access controls,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bfont002\/2024\/02\/04\/understanding-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":28603,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/users\/28603"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/282\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}