{"id":291,"date":"2025-12-06T04:34:50","date_gmt":"2025-12-06T04:34:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/?p=291"},"modified":"2025-12-06T04:34:50","modified_gmt":"2025-12-06T04:34:50","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/2025\/12\/06\/the-cia-triad\/","title":{"rendered":"The CIA triad"},"content":{"rendered":"Chase McKnight<br \/>What Is the CIA Triad?<br \/>BLUF: The CIA Triad is a model that was made up of three components: Confidentiality,<br \/>integrity, and availability. As Chai stated \u201cThe model is also sometimes referred to as the AIC<br \/>triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence<br \/>Agency.\u201d (Chai 2022). Authentication is proving who you are, while authorization is more about<br \/>permission, what you can do. All in all together they safeguard systems by confirming identity.<br \/>The CIA Triad<br \/>The CIA is made up of three different components: Confidentiality, integrity, and availability.<br \/>Confidentiality is designed to protect sensitive information from being stolen from authorized<br \/>access attempts. Chai states, \u201cIt is common for data to be categorized according to the amount<br \/>and type of damage that could be done if it fell into the wrong hands\u201d (Chai 2022). For example<br \/>setting up a 2 factor authentication system when logging into a system. Integrity is about being<br \/>consistent and accurate. Data should never be changed in transit and steps have to be taken in<br \/>order for it to stay confidential. Availability means that information needs to be readily available<br \/>at all times for authorized users. Using backups or having a disaster recovery plan is a good<br \/>example of availability.<br \/>Authentication vs Authorization<br \/>Authentication and Authorization are most of the times viewed as the same thing. Although they<br \/>have many similarities there are differences. Authentication is more about proving who you are<br \/>whereas authorization is based on permission. For example authentication is going to the airport<br \/>and showing TSA your ID before you board a plane. To go off of that a form of authorization in<br \/>the airport would be showing the boarding pass for your flight proving you can get on the plane.<br \/>Conclusion<br \/>In conclusion, confidentiality, integrity, and availability are the three components that make up<br \/>the CIA. Confidentiality is to limit access to certain information, integrity is the certainty that the<br \/>information is accurate, and availability is having a reliable access to information for authorized<br \/>users. Authentication is proving who you are, while authorization is more about permission,<br \/>what you can do.<br \/>","protected":false},"excerpt":{"rendered":"<p>Chase McKnightWhat Is the CIA Triad?BLUF: The CIA Triad is a model that was made up of three components: Confidentiality,integrity, and availability. As Chai stated \u201cThe model is also sometimes referred to as the AICtriad (availability, integrity and confidentiality) to avoid confusion with the Central IntelligenceAgency.\u201d (Chai 2022). Authentication is proving who you are, while&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/chasemcknight17\/2025\/12\/06\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31615,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/users\/31615"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chasemcknight17\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}