{"id":292,"date":"2023-03-15T18:04:09","date_gmt":"2023-03-15T18:04:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandoncreech\/?p=292"},"modified":"2023-03-15T18:05:31","modified_gmt":"2023-03-15T18:05:31","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandoncreech\/2023\/03\/15\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><br>The CIA Triad<\/p>\n\n\n\n<p><br>What is the CIA Triad?<\/p>\n\n\n\n<p><br>The CIA Triad is a model of policies followed by organizations for purposes of<br>information security. It contains the trio of policies: confidentiality, integrity, and availability, all<br>of which serve as the important foundation for every IT department in an organization.<br>Understanding the meaning of each policy and its significance to the world of cybersecurity is<br>crucial to any employee in terms of protecting an organization\u2019s assets. (Chai, 2022, pg. 1)<br>Confidentiality- Rules set by the organization that restricts access only to certain people.<br>\u2022 Relative to the meaning of privacy, confidentiality is essential to documents or data that<br>contain important information to the organization and want to keep it from the public<br>by concealing it.<br>Integrity- Relying on the information being truthful and credible.<br>\u2022 Organizations need to often make sure that the data they are exchanging has strong<br>validity and they aren\u2019t giving data to unauthorized personnel. (pg. 2)<br>Availability- The ease of access of this information people of authority.<br>\u2022 Always ensuring that people that have great authority within the organization is able to<br>access this classified information, as they are one of the first ones that should be able to<br>view it.<br>All together, these three policies have a connection to each other. This forms a pyramid that if<br>followed, it creates a strong security system. It also helps organizations figure out how much<br>value is being put into these key areas. (pg. 2)<\/p>\n\n\n\n<p><br>Authentication &amp; Authorization<\/p>\n\n\n\n<p><br>Authentication and authorization are both very important processes that the employees<br>must take to protect their vital information. To put it simply, authentication evaluates the<br>identity of the user trying to access the information and authorization determines if they should<br>be able to access it or not. Both of these processes play their own role in a connection system<br>and connect with each other. However, it\u2019s important to note the differences between the two.<br>(Andrioaie 2022)<\/p>\n\n\n\n<p><br>Differences-<br>\u2022 A simple way of understanding the key difference between authentication and<br>authorization is that authentication involves the gatekeeping of data\/information<br>through means of passwords and codes, whereas authorization involves a set of rules<br>set by the organization.<br>\u2022 A good example to represent this is by thinking of those CAPTCHA tests you see on<br>Google that determine if you are a bot or not. The CAPTCHA test itself serves as the<br>authentication and by solving it, you are proving you are not a bot. The authorization is<br>Google letting you access the information as they have determined you are indeed not a<br>bot.<\/p>\n\n\n\n<p><br>All in all, both the topics of the CIA Triad and Authentication vs. Authorization serve a<br>purpose in the industry of Cybersecurity. They are the basic building blocks of<br>knowledge that should be learned if one were to pursue this field.<\/p>\n\n\n\n<p><br>Works Cited<br>Chai, W. (2022). What is the CIA Triad? Definition, Explanation, Examples. TechTarget, Retrieved<br>January 25, 2023, from<br>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view.<br>Andrioaie, A. (2022). Authentication vs. Authorization. Heimdal Security, Retrieved January 25,<br>2023, from https:\/\/heimdalsecurity.com\/blog\/authentication-vs-authorization\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad What is the CIA Triad? The CIA Triad is a model of policies followed by organizations for purposes ofinformation security. It contains the trio of policies: confidentiality, integrity, and availability, allof which serve as the important foundation for every IT department in an organization.Understanding the meaning of each policy and its significance&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandoncreech\/2023\/03\/15\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26157,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/users\/26157"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/posts\/292\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandoncreech\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}