{"id":274,"date":"2022-09-25T23:57:51","date_gmt":"2022-09-25T23:57:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/?p=274"},"modified":"2022-09-25T23:57:54","modified_gmt":"2022-09-25T23:57:54","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/2022\/09\/25\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>Name: Dae\u2019lyn Bellamy<br>Date: 9\/18\/2022<br><br>                                            <strong>  The CIA Triad Write-UP<\/strong><br><br>Today I will be describing what the CIA triad is and why it is important for a business to follow. I<br>will also be discussing the difference between authentication and authorization in this write-up.<br>Note that the CIA triad stands for confidentiality, Integrity, and availability. Now let&#8217;s begin with<br>describing the difference between authentication and authorization since you\u2019ll need to<br>understand this before we can continue.<\/p>\n\n\n\n<p><br>                                    <strong>   Authentication and authorization<\/strong><br>Let&#8217;s start with Authentication, authentication is the process by which a security system<br>determines whether you are who you say you are. Authorization on the other hand proves that<br>you have access to a certain system or area of a building. To visualize this and to give you a<br>better idea of what I mean I will be giving an example of the two. Let us say someone wants to<br>enter a company&#8217;s server room that is restricted to all nonessential personnel in order to enter<br>the room they&#8217;ll need to do a retina scan. This would be an example of authorization since the<br>retina scan proves who they are. Now an example of authorization would be if you wanted to<br>enter the server room and asked to swipe your ID card and then you were let in, this shows that<br>you have sufficient clearance to enter that room. Now that that&#8217;s out of the way let&#8217;s continue on<br>to explain the first part of the CIA Triad, confidentiality.<br><br>                                                          <strong>CONFIDENTIALITY<\/strong><br>Confidentiality is what I would say is the second most if not the most important part of the CIA<br>triad alongside Integrity simply, because confidentiality is the process at which only people who<br>are allowed access to a system or collection of data have the authority to do so. Confidentiality<br>allows a company to have a level of privacy for its customers and employees. Keeping sensitive<br>information away from people who are not authorized to access it. Determining how sensitive<br>the information that you are trying to keep confidential can help you find the best way to secure<br>your data.<br><br>                                                               <strong> INTEGRITY<\/strong><br>Integrity is the process by which you take steps to ensure that your data is not altered in any<br>way by unauthorized people. Making sure that your data can be trusted is crucial because you<br>must be sure that none of your data has been tampered with one way to do this is to encrypt all<br>of your data. This way no unauthorized people can implant malware into your system or<br>software and potentially infect even more systems causing a further breach of security.<br><br>                                                          <strong> AVAILABILITY<\/strong><br>Availability is the process by which all of your data is kept in a state where all authorized users<br>can easily access it. Having your data in an easy-to-access state makes it easier for your<br>customers and employees to get the data that they are trying to reach. This also makes for a<br>faster and more efficient environment where all authorized users don&#8217;t have to spend very much<br>time trying to gain access to data, and at the same time makes it harder for unauthorized users<br>to gain access by means of keeping your data confidential.<br><br>                                                      <strong> CONCLUSION<\/strong><br>In summary, authentication is the means to verify if someone is who they say they are while<br>authorization is the means to verify if someone is allowed access to something. The CIA triad is<br>composed of three guidelines: confidentiality, integrity, and availability. Each part of the triad is<br>intended for companies to be able to efficiently protect their data and at the same time allow for<br>easy access to data for authorized users<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Dae\u2019lyn BellamyDate: 9\/18\/2022 The CIA Triad Write-UP Today I will be describing what the CIA triad is and why it is important for a business to follow. Iwill also be discussing the difference between authentication and authorization in this write-up.Note that the CIA triad stands for confidentiality, Integrity, and availability. Now let&#8217;s begin withdescribing&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/daelynbellamy\/2022\/09\/25\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":24962,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/users\/24962"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/posts\/274\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daelynbellamy\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}