{"id":296,"date":"2024-04-21T20:21:31","date_gmt":"2024-04-21T20:21:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/deandrewilson\/?p=296"},"modified":"2024-04-21T20:21:31","modified_gmt":"2024-04-21T20:21:31","slug":"authentication-and-authorization-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/deandrewilson\/2024\/04\/21\/authentication-and-authorization-the-cia-triad\/","title":{"rendered":"Authentication and Authorization The CIA Triad"},"content":{"rendered":"\n<p>The \u201cCIA\u201d in CIA Triad is an acronym for \u201cConfidentiality, integrity, and availability not to<br>mistake that for the actual CIA, the Triad is often called the AIC (Chai 1).\u201d It is a \u201cmodel that is<br>designed to guide policies for information security within an organization (Chai 1).\u201d<br>Confidentiality:<br>Measures are designed to prevent sensitive information from unauthorized access attempts (Chai<br>1).\u201d<br>Integrity:<br>\u201cInvolves maintaining the consistency, accuracy and trustworthiness of data over its entire<br>lifecycle (Chai 1).\u201d<br>Availability:<br>\u201cInformation should be consistently and readily accessible for authorized parties (Chai 2).\u201d<br>Authentication:<br>\u201cVerifies who the user is by using a password, biometric information, etc&#8230; It is also visible and<br>changeable by the user to some extent (&#8220;Authentication Vs Authorization&#8221;).\u201d<br>Example:<br>\u201cBy verifying their identity, employees can gain access to a human resources (HR) application<br>that includes their personal pay information, vacation time, and 401K data (&#8220;Authentication Vs<br>Authorization&#8221;)\u201d.<br>Authorization:<br>\u201cDetermines the resources the user can access (&#8220;Authentication Vs Authorization&#8221;).\u201d \u201cOften<br>maintained and implemented through an organization It is neither visible nor changeable by the<br>user (&#8220;Authentication Vs Authorization&#8221;).\u201d<br>Example:<br>\u201cOnce their level of access is authorized, employees and HR managers can access different levels<br>of data based on the permissions set by the organization (&#8220;Authentication Vs Authorization&#8221;).\u201d<br><\/p>\n\n\n\n<p>Citations<br>https:\/\/www.sailpoint.com\/identity-library\/difference-between-authentication-and-a<br>uthorization\/ <br>What is the CIA Triad? Definition,Explanation, Examples. By Wesley Chai Chai<br>Article (Links to an external site.),<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The \u201cCIA\u201d in CIA Triad is an acronym for \u201cConfidentiality, integrity, and availability not tomistake that for the actual CIA, the Triad is often called the AIC (Chai 1).\u201d It is a \u201cmodel that isdesigned to guide policies for information security within an organization (Chai 1).\u201dConfidentiality:Measures are designed to prevent sensitive information from unauthorized access&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/deandrewilson\/2024\/04\/21\/authentication-and-authorization-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":28571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/users\/28571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/posts\/296\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/deandrewilson\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}