{"id":244,"date":"2025-09-26T05:50:43","date_gmt":"2025-09-26T05:50:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/?p=244"},"modified":"2025-09-26T05:50:43","modified_gmt":"2025-09-26T05:50:43","slug":"the-cia-triad-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/2025\/09\/26\/the-cia-triad-2\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>&nbsp;&nbsp;<strong><em>The CIA Triad<\/em><\/strong><\/p>\n\n\n\n<p>The CIA Triad is one of the most important things in cybersecurity because it explains how to keep data safe,official, and easy to get to. On top of that, it\u2019s important to know the difference between authentication and authorization since both protect information in different ways.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>What the CIA Triad Is<\/em><\/strong><\/h3>\n\n\n\n<p>The CIA Triad stands for Confidentiality, Integrity, and Availability. It\u2019s a guide for keeping information secure:<\/p>\n\n\n\n<ul>\n<li>Confidentiality \u2013 Making sure private info stays private, this can mean using passwords, 2FA, or encrypting files so only the right people can see them.<br><\/li>\n\n\n\n<li>Integrity \u2013 Keeping data safe, things like file permissions, backups, and checksums help make sure nobody changes or damages data by accident or on purpose.<br><\/li>\n\n\n\n<li>Availability \u2013 Making sure the data and systems people need are up and running when they are supposed to be. Organizations use tools like backups, disaster recovery plans and extra servers so systems don\u2019t crash when something goes wrong.<br><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em><br><\/em><\/strong><strong><em>Authentication vs. Authorization<\/em><\/strong><\/h3>\n\n\n\n<p>Sometimes people mix these up, but they are different:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Term<\/td><td>What It Means<\/td><td>Why It Matters<\/td><td>Example<\/td><\/tr><tr><td>Authentication<\/td><td>Proves if the user is the original<\/td><td>Makes sure only real users can get in.<\/td><td>Using your log in info to sign into a website.<\/td><\/tr><tr><td>Authorization<\/td><td>Decides what they can do after they log in.<\/td><td>Keeps users limited to what they\u2019re allowed to see or change.<\/td><td>After the log in process, you might be able to view your own grades but not change them.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>Example in Real Life<\/em><\/strong><\/h3>\n\n\n\n<p>Online banking is an easy example:<\/p>\n\n\n\n<ul>\n<li>When you enter your login info and a code sent to your phone, that\u2019s authentication.<\/li>\n\n\n\n<li>After you\u2019re logged in, the app lets you see your account or send money. That part what you can or can\u2019t do is authorization.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;The CIA Triad The CIA Triad is one of the most important things in cybersecurity because it explains how to keep data safe,official, and easy to get to. On top of that, it\u2019s important to know the difference between authentication and authorization since both protect information in different ways. What the CIA Triad Is The&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/2025\/09\/26\/the-cia-triad-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31582,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/posts\/244"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/users\/31582"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"predecessor-version":[{"id":245,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/posts\/244\/revisions\/245"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonhalliwill\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}