{"id":295,"date":"2025-12-03T20:31:58","date_gmt":"2025-12-03T20:31:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/?p=295"},"modified":"2025-12-03T20:31:58","modified_gmt":"2025-12-03T20:31:58","slug":"the-triad-authentication","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/2025\/12\/03\/the-triad-authentication\/","title":{"rendered":"The Triad &amp; Authentication"},"content":{"rendered":"\n<p class=\"has-text-align-left\">BLUF<br>The importance of the CIA Triad (confidentiality, integrity, and availability) and the key differences between authentication and authorization. <br><br>CIA Triad<br>    In the cybersecurity field a good model to use to ensure best practice is the confidentiality, integrity, and availability triad. These ensure that your systems will not be compromised and that appropriate employees will be able to access the necessary information for their specific role.<br>    The confidentiality part of the triad is arguably the most important part, without the implementation of the confidentiality side of the triad triangle you would have poor integrity and poor availability. These steps require unique passwords, two-step verification, and even encrypting your router can all ensure network and device security (Federal Trade Commission, 2022).<br>    The integrity of these documents comes once you have good confidentiality. To ensure integrity you should have a login tracker, edit tracker, and download history. This ensures a lack of malicious tampering of the secured documents on the site (Office of Information Security, Washington University, n.d.).<br>    The last part of the triad is one that ensures access and that is availability. It is pivotal that customers and staff have access to the necessary information and that is where the availability aspect comes in. Even with good confidentiality and good integrity you need the ability to keep your networks running. One example is to have a disaster recovery system so the systems can be up as fast as possible (Fortinet, n.d.). <br><br>Authentication vs. Authorization<br>    Authentication is when you prove that you are who you are and authorization is the permission to access something (Okta, 2024). An example of authentication is your unique username and password or the two-step verification in place at the majority of these companies and services. An example of authorization is getting a server code or invitation link allowing you to view something generally restricted from the public.<br><br>Conclusion<br>    Despite what some believe, I think the CIA Triad is still well within the times and can still be used in the present day. I believe the three components still are very much active and have their specific roles. I also think it is important how there are so many authentication ways, like on my macbook I have a biometric reader of my fingerprint and then anything restricted gets alerted to my phone. The authorization is a little harder for me to wrap my brain around just because I have yet to need it at this time.<br><br>References<br>Federal Trade Commission. (2022, August). Securing Your Internet-Connected Devices at Home. Federal                                              Trade Commission Consumer Advice. Retrieved October 4, 2025, from          https:\/\/consumer.ftc.gov\/articles\/securing-your-internet-connected-devices-home<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Fortinet. (n.d.). What is the CIA Triad and Why is it important? Fortinet. Retrieved October 05, 2025, from https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<br>Office of Information Security, Washington University. (n.d.). Integrity. Office of Information Security. Retrieved October 04, 2025, from https:\/\/informationsecurity.wustl.edu\/items\/integrity\/<br><\/p>\n\n\n\n<p>Okta. (2024, September 02). Authentication vs. Authorization. Okta. Retrieved October 04, 2025, from https:\/\/www.okta.com\/identity-101\/authentication-vs-authorization\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUFThe importance of the CIA Triad (confidentiality, integrity, and availability) and the key differences between authentication and authorization. CIA Triad In the cybersecurity field a good model to use to ensure best practice is the confidentiality, integrity, and availability triad. These ensure that your systems will not be compromised and that appropriate employees will be&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brysonmoran1\/2025\/12\/03\/the-triad-authentication\/\">Read More<\/a><\/div>\n","protected":false},"author":31444,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/users\/31444"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/posts\/295\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brysonmoran1\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}