{"id":184,"date":"2022-09-25T09:00:00","date_gmt":"2022-09-25T14:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonburke\/?p=184"},"modified":"2024-02-02T18:24:05","modified_gmt":"2024-02-02T23:24:05","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandonburke\/2022\/09\/25\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><em>The three letters in the CIA Triad stand for Confidentiality, Integrity, and Availability. The Triad forms the foundation and fundamental components of cybersecurity, security development, and security research. The Triad provides a foundation for Authentication and Authorization, which relies on security measures to be in place.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Confidentiality<\/h2>\n\n\n\n<p>Confidentiality is the privacy and secrecy of an organization\u2019s or one\u2019s own information and data (Chai, 2022). It is crucial to safeguard this data, as not providing adequate measures leads to information being stolen by threat actors. To counter this, companies often implement role-based access controls and encryption to sensitive data, such as personally identifiable information. Role-based access controls mean that a user must have a certain role, such as administrator, to view confidential information (Gibson, 2020). Additionally, encryption allows for data to be securely stored. To decrypt the data, a key must be provided. The key is only owned by people with certain roles. This allows for data to remain confidential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrity<\/h2>\n\n\n\n<p>Integrity is maintaining trust and accuracy of files, applications, and data (Chai, 2022). For example, the Secure Hashing Algorithm, SHA, is used to verify that files, applications, or information are not tampered with. SHA provides a set output of characters and numbers. If a file, application, or data has any changes made, the SHA\u2019s output will be different. By comparing the SHA\u2019s output, one can see if there are any changes made. If no changes are made, one can assume that the file, application, or data is intact and is trustworthy, therefore providing integrity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Availability<\/h2>\n\n\n\n<p>Company\u2019s often store and encrypt information that is sensitive for the public eye. However, people with certain roles can access this information. For example, these roles can include administrators and developers. This leads to the concept of availability. Availability is the ability for information and data to be readily accessible to authorized users (Chai, 2022). On the other hand, availability could also refer to the uptime of critical infrastructure systems. These systems could include databases, web servers, file transfer servers, and more. It is important to keep the systems online as it prevents monetary loss for the company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authentication vs Authorization<\/h2>\n\n\n\n<p>Authentication is the process of proving one\u2019s identity (Wike et al., 2022). This could be as simple as entering a username and password to log in to an account. The username and password prove that one owns the account and associates with that identity. This is not always foolproof. This means that administrators and websites often encourage the use of two factor or multifactor authentication. A second form of authentication provides an extra layer of security because additional information is needed to prove the identity of an account. Authorization is granting permission to an authenticated user to perform an action (Wike et al., 2022). For example, a person login into an admin account may be able to block certain IP addresses from reaching a website. A regular user account does not have access to this type of functionality. This means that the regular user account does not have authorization to access and perform this action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The CIA Triad provides three important cybersecurity components that all organizations should implement. It is built to help protect and mitigate attacks and downtime against vulnerable and critical systems. It also provides insight on the trustworthiness of files, applications, and data. The Triad is best implemented on a case-by-case basis to suit the needs of an organization. Authentication and authorization would not be able to exist without the CIA Triad. Both rely heavily on the correct implementation of the Triad to be effective to better improve security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Chai, W. (2022, June 28). What is the CIA triad? Definition, Explanation, Examples \u2013 TechTarget. WhatIs.com. Retrieved September 13, 2022, from https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/p>\n\n\n\n<p>Gibson, D. (2020). Understanding Identity and Access Management. In Comptia Security +: Get Certified Get Ahead SY0-601 Study Guide (pp. 35\u201366). essay, YCDA, LLC.<\/p>\n\n\n\n<p>Wike, R., Richards, O., Macy, M., Waweru, E., Coulter, D., &amp; Adman, N. (2022, September 6). Authentication vs. Authorization \u2013 Microsoft Entra. Microsoft Entra | Microsoft Docs. Retrieved September 13, 2022, from https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/authentication-vs-authorization<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>The three letters in the CIA Triad stand for Confidentiality, Integrity, and Availability. The Triad forms the foundation and fundamental components of cybersecurity, security development, and security research. The Triad provides a foundation for Authentication and Authorization, which relies on&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/2022\/09\/25\/the-cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24541,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/184"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/users\/24541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/184\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}