{"id":133,"date":"2022-04-30T02:04:48","date_gmt":"2022-04-30T02:04:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2026-02-26T01:52:06","modified_gmt":"2026-02-26T01:52:06","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandonvuono\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<p>Brandon Vuono&nbsp;<\/p>\n\n\n\n<p>CYSE 200T&nbsp;&nbsp;<\/p>\n\n\n\n<p>CIA Write up&nbsp;<\/p>\n\n\n\n<p>18&nbsp;February&nbsp;2026&nbsp;<\/p>\n\n\n\n<p>Authentication vs. Authorization&nbsp;<\/p>\n\n\n\n<p>The CIA triad of confidentiality, integrity, and availability is a foundational model guiding&nbsp;security policy for digital systems. These three&nbsp;principles&nbsp;ensure that&nbsp;information is protected from unauthorized access&nbsp;and system disruption. Understanding the difference between authentication and authorization strengthens the implementation of&nbsp;these three principles. This is done by verifying identity and controlling permissions.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Cyber Security is essential to protecting digital information in today&#8217;s technology driven society. Companies rely heavily on information systems to store vital data such as financial records and operational data.&nbsp;The CIA Triad Provides a Structured framework for understanding how information should be&nbsp;protected (Chai,&nbsp;2022).&nbsp;&nbsp;<\/p>\n\n\n\n<p>Confidentiality ensures&nbsp;sensitive&nbsp;information is&nbsp;accessible&nbsp;only to authorized individuals. It protects data from being&nbsp;disclosed&nbsp;to unauthorized users. Examples of confidential&nbsp;information&nbsp;include but not limited to social security numbers, passwords, medical records, and banking information.&nbsp;Companies&nbsp;maintain&nbsp;confidentiality through controls such as encryption and multi-factor authentication (Chai, 2022).&nbsp;Integrity refers to&nbsp;maintaining&nbsp;the accuracy and reliability of data. Information should not be changed by unauthorized users&nbsp;at&nbsp;any time. Whether the data is in storage or&nbsp;transmission,&nbsp;it should not be altered.&nbsp;For example, if someone is sending a recipient&#8217;s money, the amount shall not be changed.&nbsp;Mechanisms such as hashing and digital signatures are commonly used to preserve integrity (National Institute of&nbsp;Standards and Technology,&nbsp;NIST 2013).&nbsp;Availability&nbsp;ensures that the authorized user can access the data or information needed.&nbsp;If data is&nbsp;confidential, the user must be authorized to access the data.&nbsp;Maintaining a balance between the CIA Triad is essential for security of data and information.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When it comes to authentication and&nbsp;authorization,&nbsp;they are&nbsp;closely&nbsp;related. They do serve different purposes to a cyber security&nbsp;professional.&nbsp;Authentication is the&nbsp;process&nbsp;of verifying the&nbsp;user&#8217;s&nbsp;identity. It&nbsp;verifies that&nbsp;the person doing the task is who they say they are.&nbsp;Authorization&nbsp;occurs&nbsp;after authentication and determines what an&nbsp;authenticated&nbsp;user is allowed to do.&nbsp;This will restrict any&nbsp;access&nbsp;or modifications a&nbsp;user&#8217;s&nbsp;attempts to conduct.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The CIA Triad&nbsp;remains&nbsp;the foundational model for information&nbsp;security. It is&nbsp;widely&nbsp;used for&nbsp;cyber&nbsp;security&nbsp;professions. Confidentiality protects unauthorized access.&nbsp;Integrity&nbsp;ensures accuracy.&nbsp;Availability&nbsp;lets the data be accessible when needed.&nbsp;Additionally,&nbsp;authentication&nbsp;and authorization strengthen the CIA Triad by further controlling user verification and&nbsp;access&nbsp;rights. By applying the model&#8217;s companies and organizations can create a robust secure information system that is resilient.&nbsp;These make the capability of defending&nbsp;against&nbsp;modern cyber threats easier.&nbsp;&nbsp;<\/p>\n\n\n\n<p>References&nbsp;<\/p>\n\n\n\n<p>-Chai, W (2022 June 28) What is the CIA Triad? Definition,&nbsp;explanation, examples.&nbsp;https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view&nbsp;<\/p>\n\n\n\n<p>-National Institute of Standards and Technology 2013. Security and privacy controls for federal information systems and organizations.&nbsp;https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r4.pdf&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brandon Vuono&nbsp; CYSE 200T&nbsp;&nbsp; CIA Write up&nbsp; 18&nbsp;February&nbsp;2026&nbsp; Authentication vs. Authorization&nbsp; The CIA triad of confidentiality, integrity, and availability is a foundational model guiding&nbsp;security policy for digital systems. These three&nbsp;principles&nbsp;ensure that&nbsp;information is protected from unauthorized access&nbsp;and system disruption. Understanding the difference between authentication and authorization strengthens the implementation of&nbsp;these three principles. This is done by&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandonvuono\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":18452,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/users\/18452"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/133\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}