{"id":241,"date":"2025-04-28T21:38:17","date_gmt":"2025-04-28T21:38:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/?page_id=241"},"modified":"2025-04-28T21:41:26","modified_gmt":"2025-04-28T21:41:26","slug":"write-up-the-cia-triad","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/write-up-the-cia-triad\/","title":{"rendered":"Write-Up: The CIA Triad"},"content":{"rendered":"\n<p>It is stated that Confidentiality, integrity, and availability, also known as the CIA triad, is a model<br>designed to guide policies for information security within an organization. The CIA triad<br>comprises three primary building blocks: Confidentiality, integrity, and availability (Chai &amp;<br>Hashemi, 2023). Confidentiality prevents unauthorized users from gaining access by<br>encryptions, identity verification, and data protection. It is also defined as measures to preven<br>sensitive information from unauthorized access attempts. It is common for data to be classified<br>according to the amount and type of damage that could be done if it fell into the wrong hands.<br>(Chai &amp; Hashemi, 2023) In addition, it is stated that integrity involves maintaining data<br>consistency, accuracy, and trustworthiness over its entire life cycle (Chai &amp; Hashemi, 2023).<br>Lastly, availability means information should be consistently and readily accessible to authorized<br>parties (Chai &amp; Hashemi, 2023).<br><\/p>\n\n\n\n<p>Also, during my research, I learned about authentication and authorization, both crucial elements<br>of security, but they have separate objectives. Identify a user&#8217;s identity. This is known as<br>authentication, and some authentication methods are as follows: multifunction authentication,<br>voice recognition, facial recognition, fingerprint scan, or iris scan. Furthermore, authorization<br>allows or restricts users to access based on permission. For example, everyone uses online<br>banking. When logging in, a person must enter their username and password to prove that it is<br>them. This is known as authentication. After logging in, this individual may have limited access<br>to what they can do. For instance, they can only view their account balance and past transactions,<br>but they are not allowed to transfer money from the accounts, add users, apply for loans or credit<br>cards, or change the account settings without permission. This is due to the restricted access<br>placed on the user who has logged into the bank account. This is an example of authorization.<br><\/p>\n\n\n\n<p>Work Cite<br>Hashemi-Pour, C., &amp; Chai, W. (2023, December 21). What is the CIA triad?: Definition from<br>TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-<br>availability-CIA?jr=onm<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is stated that Confidentiality, integrity, and availability, also known as the CIA triad, is a modeldesigned to guide policies for information security within an organization. The CIA triadcomprises three primary building blocks: Confidentiality, integrity, and availability (Chai &amp;Hashemi, 2023)&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/write-up-the-cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":20749,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/241"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/users\/20749"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/241\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/241\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/media?parent=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}