{"id":274,"date":"2023-02-05T19:38:27","date_gmt":"2023-02-05T19:38:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/coreytarter\/?p=274"},"modified":"2023-04-16T16:44:25","modified_gmt":"2023-04-16T16:44:25","slug":"cia-triad-and-authentication-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/coreytarter\/2023\/02\/05\/cia-triad-and-authentication-authorization\/","title":{"rendered":"CIA Triad and Authentication &amp;   Authorization"},"content":{"rendered":"\n<p>The CIA Triad is made up of three parts.  They are confidentiality, integrity, and availability.  There is a difference between authentication and authorization.  Authentication is who and  authorization is what. <br><br><strong>CIA Triad <\/strong><\/p>\n\n\n\n<p>The CIA Triad is a way that cyber security is used in different organizations (What Is the CIA Triad? Definition, Explanation, Examples , 2022). The CIA Triad is made up of three distinct parts: Confidentiality, Integrity and Availability.  Confidentiality is basically privacy (What Is the CIA  Triad? Definition, Explanation, Examples , 2022).  This is used to make sure that people who do  not need to access the information are not allowed to. Integrity is used to make sure the correct user is the only one able to change certain things. Two examples of Integrity are user controls  and file permissions (What Is the CIA Triad? Definition, Explanation, Examples , 2022).  Being able  to access the data when and where you want is Availability.  You will need to make sure that your  technology is capable and kept up to date (What Is the CIA Triad? Definition, Explanation, Examples , 2022). <br><br><strong>Authentication &amp; Authorization <\/strong><br>Authentication is used to make sure the person accessing data is the correct person (SailPoint,  2021).  Authorization is used to figure out which data the person is allowed to access (SailPoint, 2021).  Basically, authentication is the who and authorization is the what.  That is a pretty large  difference between the two things.  An example of authentication is 2 different co-workers, Jim  and Bob are both trying to login to their work computers.  They both have different usernames  and passwords to authenticate they are the correct person and not the other user.  Using the  same two people for the authorization example.  Bob is a manager and Jim is just a normal  employee.  Bob is authorized to access more and different data then Jim. <br><br><strong>Conclusion <\/strong><br>The CIA Triad is made up of three different parts.  Confidentiality is privacy, Integrity is making  sure the correct people access the data and Availability is being able to access the data when  and where you want.  Authentication is the process of making sure the user is who they say they  are.  Authorization is making sure the user is only accessing the correct data. <br><br><br><strong>References <\/strong><br> SailPoint. (2021, July 19).  Difference between Authentication and Authorization . SailPoint.  Retrieved January 29, 2023, from  https:\/\/www.sailpoint.com\/identity-library\/difference-between-authentication-and-authoriz <br> ation\/ <br> What is the CIA Triad? Definition, Explanation, Examples.   (2022, June 28). TechTarget. Retrieved  January 29, 2023, from  https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?j  r=on <br><br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is made up of three parts. They are confidentiality, integrity, and availability. There is a difference between authentication and authorization. Authentication is who and authorization is what. CIA Triad The CIA Triad is a way that cyber security is used in different organizations (What Is the CIA Triad? Definition, Explanation, Examples ,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/coreytarter\/2023\/02\/05\/cia-triad-and-authentication-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":26188,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/users\/26188"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/posts\/274\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreytarter\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}