{"id":274,"date":"2023-02-12T17:50:49","date_gmt":"2023-02-12T17:50:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/christinaflowers\/?p=274"},"modified":"2023-02-12T17:50:49","modified_gmt":"2023-02-12T17:50:49","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/christinaflowers\/2023\/02\/12\/the-cia-triad\/","title":{"rendered":"The CIA triad"},"content":{"rendered":"\n<p>The CIA Triad is the guiding force for organizations to construct security policies for the<br>information they use, store, and transmit. CIA stands for confidentiality, integrity, and<br>availability, which are the primary set of standards that each entity must adhere to in order to<br>ensure their data is kept safe. It is a globalized standard that promotes a strict authentication<br>process of individuals who have access to the information being managed by the organization.<br>The CIA Triad provides the building blocks for creating a security protocol that best suits each<br>individual organization\u2019s needs and gives them the tools for adapting to security changes as<br>needed.<\/p>\n\n\n\n<p><br><strong>Authentication vs. Authorization<\/strong><br>Authentication is completed by verifying the identity of the person that is attempting to access<br>the information. The most common method of authentication is a username and password.<br>Two-factor authentication is also becoming more commonplace. Two-factor authentication, or<br>2FA, is defined as \u201ca security process in which users provide two different authentication<br>factors to verify themselves.\u201d (Rosencrance et al., 2021). Authorization is another large<br>aspect of the CIA Triad. Authorization is the process of giving a person specific access to<br>certain pieces of information or even entry to different parts of a building. For example,<br>when someone works in a government building, they must show photo identification to<br>authenticate their identity. However, they may also be required to scan an identification<br>card for entry into higher security parts of the building, which can even involve 2FA by a<br>fingerprint or retinal scan.<\/p>\n\n\n\n<p><br><strong>Basic Principles<\/strong><br>The CIA Triad is composed of three basic principles: confidentiality, integrity, and<br>availability. It is intended for use as a guideline for structuring security protocols for<br>new and existing companies and technologies. Confidentiality \u201censures that data is kept<br>private, secret, and secure.\u201d (Ledesma, 2022). Data must be kept confidential to ensure<br>that only people who are authorized to access it are able to view it and even make<br>changes to it. Confidentiality promotes trust in the organization that the data they are<br>securing is not retrieved by unauthorized individuals. The second pillar of the CIA Triad<br>is integrity. Integrity creates an environment for data to be kept accurate in addition to<br>reliable. This is done by protecting data that is transmitted and received, assuring that it<br>is not altered in the process. The last pillar of the CIA Triad is availability. Data needs to<br>be readily available to allow organizations to maintain it as needed. If data is not readily<br>available then it can lead to a lack of business opportunities or even an attack on the<br>company as a whole.<br>The CIA Triad also provides guidelines on data recovery in the event of a<br>fire or natural disaster. Protecting data on a separate hard drive and stored in a<br>separate location, preferably in a water and fire resistant safe, is a great way to ensure<br>that data is recoverable. Plus, accessing the back-ups regularly to make certain that the<br>back-ups are readily available and reliable and has not been compromised.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>The CIA Triad is a universal system used by most, if not all, organizations. It<br>promotes the confidentiality, integrity, and availability of data that is accessed,<br>transmitted, and stored by an entity. The CIA Triad helps to guide organizations in<br>creating a security system that is right for their specific level of security needs and<br>allows for them to build from it and adapt to changes they may encounter.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>Rosencrance, L., Loshin, P., &amp; Cobb, M. (2021, July 7). What is Two-factor authentication<br>(2FA) and how does it work? Security. Retrieved February 5, 2023,<br>https:\/\/www.techtarget.com\/searchsecurity\/definition\/two-factor-authentication<br>Ledesma, J., (2022, July 11). What is the CIA triad? Varonis. Retrieved February 5, 2023,<br>https:\/\/www.varonis.com\/blog\/cia-triad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is the guiding force for organizations to construct security policies for theinformation they use, store, and transmit. CIA stands for confidentiality, integrity, andavailability, which are the primary set of standards that each entity must adhere to in order toensure their data is kept safe. It is a globalized standard that promotes a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/christinaflowers\/2023\/02\/12\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":21160,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/users\/21160"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/posts\/274\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christinaflowers\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}