{"id":290,"date":"2026-05-03T19:09:28","date_gmt":"2026-05-03T19:09:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/?p=290"},"modified":"2026-05-03T19:09:28","modified_gmt":"2026-05-03T19:09:28","slug":"cia-triad-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/2026\/05\/03\/cia-triad-write-up\/","title":{"rendered":"CIA Triad Write Up"},"content":{"rendered":"<br \/>The CIA Triad Write Up<br \/>Darius Burks<br \/>Old Dominion University<br \/>February 22,2026<br \/><br \/><br \/><br \/><br \/><br \/><br \/><br \/>\tThe CIA TRIAD is a model for cybersecurity that shows the steps that help secure and protect online systems and their information. The three steps include Confidentiality, Integrity, and Availability. These three steps help institute the foundation for the whole structure of cybersecurity. It gives a outline of what is being protected in a company and the importance of why we must protect.<br \/>Parts of the CIA Triad\t<br \/>\tOne step on the Triad in Confidentiality. The purpose of this is to only allow those who are authorized or who have been given authorization to access certain files and information. An example of cybersecurity enforcing confidentiality would be two step authentications. Old Dominion University uses the two step verification when you are trying to log on to your Midas account that holds personal data such as addresses, finance statements, and class schedules. <br \/>\tAnother step on the Triad is Integrity. This principle is used to ensure that the data provided meets all the necessary requirements that show it is trustworthy. Holding integrity in cybersecurity is used so that the data and information provided can be trusted and is safe to use by only the authorized users. Integrity protects users and their data from fraud, accidental or purposeful miscues, data festering. <br \/>\tThe last step is Availability. With the other two steps being managed, it is impractical for the information not to be available to those who need to view it. Basically, Availability helps ensure the system is up and running and is obtainable. Availability helps protect against system malfunctions and server overloads.<br \/><br \/>Authentication and Authorization<br \/>\tAuthentication is the process of confirming the user is who they are portraying to be. An example would be logging into your google account and they send email with a passcode so you can verify it is your account. Authorization is the process of figuring out what the user is permitted to access on the network system. An example of authorization would be after logging  into your google account, you can see all the apps like google docs and google maps, but you can not log into another person\u2019s google account.<br \/><br \/>Conclusion<br \/>\tThe CIA Triad is covered in three pieces; Confidentiality, Integrity, and Availability and they are the justification for cybersecurity. Together, they help protect the users and the networks against any threat that could potentially corrupt the information and data.<br \/><br \/><br \/><br \/><br \/><br \/><br \/>Reference Page<br \/>What is the CIA triad and why is it important?. Fortinet. (n.d.). https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad <br \/><br \/>GeeksforGeeks. (2025, December 22). What is CIA triad? https:\/\/www.geeksforgeeks.org\/computer-networks\/the-cia-triad-in-cryptography\/ <br \/><br \/>","protected":false},"excerpt":{"rendered":"<p>The CIA Triad Write UpDarius BurksOld Dominion UniversityFebruary 22,2026 The CIA TRIAD is a model for cybersecurity that shows the steps that help secure and protect online systems and their information. The three steps include Confidentiality, Integrity, and Availability. These three steps help institute the foundation for the whole structure of cybersecurity. It gives a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dburkscyb1\/2026\/05\/03\/cia-triad-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":29538,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/users\/29538"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/posts\/290\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dburkscyb1\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}