{"id":274,"date":"2022-09-23T00:29:15","date_gmt":"2022-09-23T00:29:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/christian-carrion\/?p=274"},"modified":"2022-09-23T00:30:45","modified_gmt":"2022-09-23T00:30:45","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/christian-carrion\/2022\/09\/23\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left\">      Cyber-attacks are becoming more frequent and complex. Organizations want solutions on how to protect the secrecy of data, consistency of data, and availability of data. This is where the CIA Triad comes into play. CIA stands for confidentiality, integrity and availability. The CIA Triad acts like a model, and guides an organization to design policies for cyber security. The model does not 100 percent protect data, but can lead to improved security.<br>      Confidentiality is like the privacy of information. The purpose is to protect sensitive data being accessed by unauthorized users. Confidentiality, also helps an organization to list what certain data needs more protection. For example, comparing both my navy federal app, and steam account, I would list my navy federal app more important than the steam account. Reason being that the app contains account, and routing number. The steam account does not contain and sensitive information. Thus, there is not any risk involved if the account is not well protected. <br>       Integrity is preventing any data bring changed or deleted from unauthorized users. An example of an integrity beach, is if a hacker seizes data and alters it. Integrity ensures that data remains constant, reliable and accurate. The final component, availability, ensures that systems, or data can be readily accessed to anytime a user needs them. <br>      There are various methods organizations can implement confidentiality, integrity, and availability. For example:<br>Confidentiality:<br>\u2022 2 factor authorization, <br>\u2022 data handled based on an organization\u2019s privacy level. <br>integrity:<br>\u2022 Have backups<br>\u2022 Have data logs, and access control <br>Availability:<br>\u2022 Update software and applications constantly<br>\u2022 Have a data recovery plan<br>\u2022 Server monitoring systems<\/p>\n\n\n\n<p class=\"has-text-align-left\">     There are distinct differences between authentication, and authorization. Authentication involves the verification of a user, while authorization is verifying is the user does or does not have access to a system. An example of authentication is an individual passing through security at an airport. The individual has to present an Id or passport, to give clarification that they are who they say they are. For authorization, an example can be an employee who has passed the authentication process, and a system checking what level of access that employee has in the company.<br><br><br><br>                                                              References<br>https:\/\/auth0.com\/docs\/get-started\/identity-fundamentals\/authentication-and-authorization<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks are becoming more frequent and complex. Organizations want solutions on how to protect the secrecy of data, consistency of data, and availability of data. This is where the CIA Triad comes into play. CIA stands for confidentiality, integrity and availability. The CIA Triad acts like a model, and guides an organization to design policies&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/2022\/09\/23\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":24947,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/users\/24947"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/posts\/274\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}