{"id":298,"date":"2023-12-08T02:44:42","date_gmt":"2023-12-08T02:44:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cpolansky\/?p=298"},"modified":"2023-12-08T02:44:42","modified_gmt":"2023-12-08T02:44:42","slug":"the-cia-triad-and-authentication-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cpolansky\/2023\/12\/08\/the-cia-triad-and-authentication-authorization\/","title":{"rendered":"The CIA Triad and Authentication &amp;Authorization"},"content":{"rendered":"\n<p>In this paper I will break down the acronym of the CIA Triad and discuss the terms and<br>differences of Authentication and Authorization. Further I will explain the importance of these<br>terms and their applicability to cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CIA Triad<\/h2>\n\n\n\n<p>The CIA Triad is a basic tenet of Cybersecurity. It stands for Confidentiality, Integrity, and<br>Availability. These easily defined words are simple to follow and provide a road map to basic<br>cyber security principles. Confidentiality sets limits on who can access data. Integrity ensures that<br>the data is valid as originally written and has not been altered by either mistake or a malicious<br>actor. Availability ensures that the data is available; or a valid backup copy exists (Chai, 2023).<br>The security posture and importance that organizations and manufactures of IT products place on<br>overall cybersecurity principles can be defined by the applicability of the basic doctrine of the<br>CIA Triad within.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authentication &amp; Authorization<\/h2>\n\n\n\n<p>Authentication is proving that a user of information technology is who they say they are.<br>This can be accomplished by something the user knows (password\/pin), something they have<br>(physical security devices such as Common Access Card\/Smart Card) or something they are<br>(fingerprint, iris, voice, facial recognition). Authorization on the other hand is determined by<br>limiting authenticated users to what they are allowed to access. Authorization can be given<br>broadly (such as a public internet site), limited to a particular department (ex: finance), or to a very<br>limited group of individuals (ex: management).<br>Authentication and Authorization have two distinct meanings and are often easily<br>confused. These concepts can be both different and similar. They are similar because they both<br>rely on proper identification of the user, but they are different in that authenticated users might<br>not be authorized access to certain information or privileges on a system (OneLogin. n.d.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In conclusion, I have broken down the acronym of the CIA Triad: Confidentiality, Integrity,<br>and Availability; and discussed the definition and differences between Authentication and<br>Authorization. I further explained the importance of these terms and their applicability to<br>cybersecurity. The usage of the CIA Triad in Cybersecurity, along with an understanding of<br>Authentication and Authorization will better protect information systems from accidental or<br>malicious threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ul>\n<li>Chai, W. (2023, February 10). What is the CIA triad? definition, explanation, examples. WhatIs.com. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br><\/li>\n\n\n\n<li>Authentication vs. authorization: What\u2019s the difference? OneLogin. (n.d.). https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this paper I will break down the acronym of the CIA Triad and discuss the terms anddifferences of Authentication and Authorization. Further I will explain the importance of theseterms and their applicability to cybersecurity. The CIA Triad The CIA Triad is a basic tenet of Cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These easily&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cpolansky\/2023\/12\/08\/the-cia-triad-and-authentication-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":27586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/users\/27586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/298\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}