{"id":308,"date":"2025-02-04T21:50:08","date_gmt":"2025-02-04T21:50:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/?p=308"},"modified":"2025-02-04T21:50:08","modified_gmt":"2025-02-04T21:50:08","slug":"write-up-the-cia-triad-cyse-200t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/2025\/02\/04\/write-up-the-cia-triad-cyse-200t\/","title":{"rendered":"Write-Up The CIA Triad &#8211; CYSE 200T"},"content":{"rendered":"\n<p>Celeste Meraz-Luna <br>Charles E. Kirkpatrick<br>CYSE200T 25962<br>Feb 2, 2025<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>The CIA Triad<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">The CIA triad represents confidentiality, integrity and availability. The model is designed to guide polices for information technology and is considered the most foundational and crucial cybersecurity need. Confidentiality are rules that set limits to access data, integrity assures the data is accurate and availability guarantees the data is accessible by the authorized users. Authentication verifies users and authorization allows users to access data. <\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Introduction<br><\/strong>The CIA triad contains important concepts within the information security field. The three principles together create a framework that is designed to guide polices for information technology. As well as authorization and authentication, proving a crucial topic that is associated with the internet as a key component to the service infrastructure. This paper will explore the values of the CIA triad and the difference between authentication and authorization. <\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>The CIA Triad<\/strong> <br>The CIA triad represents confidentiality, integrity and availability. The model, with the three principles together is designed to create a framework to guide polices for information technology. It is considered the most foundational and crucial cybersecurity need and contains important concepts within the information security field. It also provides a simple and complete checklist for evaluating an organization\u2019s security. <br>Confidentiality is basically privacy. These are measures that are designed to prevent sensitive information from unauthorized access. It limits access to individuals within the organization and only allows authorized individuals. Integrity guarantees the practice of the data being trustworthy and accurate. Data should not be modified during transmission and actions are taken to ensure the data cannot be altered by unauthorized individuals. This allows the recipient to receive valid information. Availability of information is consistently and readily accessible for authorized individuals and parties. It also includes the maintaining of hardware and software to protect data from malicious acts that stop data from becoming available.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Authentication vs. Authorization <br><\/strong>Authentication and authorization prove a crucial topic that is associated with the internet as a key component to the service infrastructure. Authentication is the method of verifying the identity of an individual or system to ensure they are who they claim to be.   Authorization is the method of granting permission to an individual or system and specifying the assets they are able to access and actions they can carry out. <br>In the authentication process, the identity of individuals is checked to access the system or information while in the authentication process, the individual\u2019s authorities are checked to access the resource. An example of authentication is when students log into their school account and the system sends them a two-factor authentication. At ODU, they use the application called \u201cDuo Mobile.\u201d An example of authorization is what students can access on the canvas. Professors remove links on the course that students cannot access. <\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Conclusion <br><\/strong>The CIA triad represents confidentiality, integrity and availability and contains important concepts within the information security field. It also provides a simple and complete checklist for evaluating an organization\u2019s security. Authentication and authorization prove a crucial topic that is associated with the internet as a key component to the service infrastructure. Authentication verifies users and authorization allows users to access data. The CIA triad, authorization and authentication are essential components to information security and provide important guidance to a secure environment. <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Celeste Meraz-Luna Charles E. KirkpatrickCYSE200T 25962Feb 2, 2025 The CIA Triad The CIA triad represents confidentiality, integrity and availability. The model is designed to guide polices for information technology and is considered the most foundational and crucial cybersecurity need. Confidentiality are rules that set limits to access data, integrity assures the data is accurate and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/2025\/02\/04\/write-up-the-cia-triad-cyse-200t\/\">Read More<\/a><\/div>\n","protected":false},"author":30333,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/posts\/308"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/users\/30333"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/posts\/308\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/tags?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}