{"id":296,"date":"2024-04-26T03:23:40","date_gmt":"2024-04-26T03:23:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chasedickerson\/?p=296"},"modified":"2024-04-26T03:23:40","modified_gmt":"2024-04-26T03:23:40","slug":"understanding-the-cia-triad-authentication-and-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/chasedickerson\/2024\/04\/26\/understanding-the-cia-triad-authentication-and-authorization\/","title":{"rendered":"Understanding the CIA Triad, Authentication, and Authorization"},"content":{"rendered":"\n<p>Chase Dickerson<br>February 4, 2024<br><\/p>\n\n\n\n<p><strong>Understanding the CIA Triad, Authentication, and Authorization<\/strong><br><\/p>\n\n\n\n<p>The CIA triad is made up of these three fundamental principles Confidentiality, integrity, and<br>availability. These principles serve as the foundation for information security policies.<br>Confidentiality is keeping sensitive information secure and private. This means using encryption,<br>access controls, physical security measures, and other controls to prevent unauthorized access.<br>We need to lock down data to keep it safe.<br><\/p>\n\n\n\n<p>Integrity deals with maintaining the accuracy and trustworthiness of data throughout its entire<br>life cycle. So using error checking, data validation, backups, version control, and other<br>protections to prevent unauthorized modifications. We need to keep data protected and<br>untampered.<br><\/p>\n\n\n\n<p>Availability means keeping information accessible and usable for authorized users when<br>needed. This relies on having redundancy through backups and spare capacity, so the system<br>keeps running if something fails. It also requires regular maintenance and quick repairs to fix<br>bugs or hardware issues.<br><\/p>\n\n\n\n<p>Together, these three concepts provide a robust foundation for comprehensive security policies,<br>which organizations uphold through access controls, encryption, backups, and redundancy.<br>Now, when a user tries to log into a system, two key processes happen behind the scenes \u2013<br>authentication and authorization. Authentication is about verifying identity \u2013 checking that users<br>really are who they claim to be, typically by validating login credentials like usernames and<br>passwords. Authorization is different, as it establishes what authenticated users are allowed to<br>access or modify according to their role. For instance, a user might provide valid login details,<br>but authorization determines what resources they can actually see or change post-login.<br>In short, authentication confirms a user\u2019s identity, while authorization controls their system<br>access. When done right, these two elements work together to ensure users can only access<br>the resources they are properly authorized for \u2013 no more, no less.<br><\/p>\n\n\n\n<p>Looking closer at authentication, it kinda relies on validating credentials provided by the user.<br>The most common approach is username\/password, where a user enters their pre-registered<br>username and associated password. The system checks if this matches a user in the system. It<br>helps to enforce password complexity and expiration policies to ensure strong passwords.<br>A good example for protecting sensitive data on the internet and ensuring confidentiality is<br>requiring an account number or routing number for banking online. Data encryption is another<br>common method of ensuring confidentiality. User IDs and passwords constitute a pretty<br>standard procedure required for social media platforms, for example. Two-factor authentication<br>(2FA) is also becoming commonplace in the healthcare and financial services industries<br>(Hashemi-Pour &amp; Chai, 2022).<br><\/p>\n\n\n\n<p>Source: <br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chase DickersonFebruary 4, 2024 Understanding the CIA Triad, Authentication, and Authorization The CIA triad is made up of these three fundamental principles Confidentiality, integrity, andavailability. These principles serve as the foundation for information security policies.Confidentiality is keeping sensitive information secure and private. This means using encryption,access controls, physical security measures, and other controls to prevent&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/chasedickerson\/2024\/04\/26\/understanding-the-cia-triad-authentication-and-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":28696,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/users\/28696"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/posts\/296\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasedickerson\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}